{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T11:56:29Z","timestamp":1775476589000,"version":"3.50.1"},"reference-count":73,"publisher":"Oxford University Press (OUP)","issue":"6","license":[{"start":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T00:00:00Z","timestamp":1762041600000},"content-version":"vor","delay-in-days":25,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Meta Platforms, Inc"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,8]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Personalized marketing driven by AI-powered algorithms on social media has introduced significant privacy challenges, prompting users to adopt various privacy management strategies. This study employs latent profile analysis (LPA) to identify distinct user profiles based on privacy management patterns and explore the protection motivation factors that predict them. Using a cross-national survey in the United States and Singapore (N\u2009=\u20092,078), we identified four latent user profiles in both countries. \u201cPrivacy-benefit Maximizers\u201d actively engaged in all privacy management strategies, including information withdrawal, disclosure management, and avoidance. The \u201cPrivacy Unnerved\u201d group relied predominantly on avoidance strategies while showing low engagement in other privacy practices. \u201cBalanced Guardians\u201d adopted a moderate approach across all strategies. The fourth group, unique to each country, exhibited distinct patterns in their reliance on privacy management strategies. Among privacy motivation factors, privacy self-efficacy emerged as a key predictor of profile membership across different user groups in both countries.<\/jats:p>","DOI":"10.1093\/jcmc\/zmaf021","type":"journal-article","created":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T11:59:33Z","timestamp":1758801573000},"source":"Crossref","is-referenced-by-count":1,"title":["Latent privacy management profiles on algorithmic social media: cross-cultural insights into privacy protection motivations and management behaviors"],"prefix":"10.1093","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8076-7126","authenticated-orcid":false,"given":"Hyunjin","family":"Kang","sequence":"first","affiliation":[{"name":"Wee Kim Wee School of Communication and Information, Nanyang Technological University ,","place":["Singapore"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6808-7590","authenticated-orcid":false,"given":"Tingting","family":"Yang","sequence":"additional","affiliation":[{"name":"Wee Kim Wee School of Communication and Information, Nanyang Technological University ,","place":["Singapore"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6415-2203","authenticated-orcid":false,"given":"Nazira","family":"Banu","sequence":"additional","affiliation":[{"name":"Wee Kim Wee School of Communication and Information, Nanyang Technological University ,","place":["Singapore"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4729-1370","authenticated-orcid":false,"given":"Jeeyun","family":"Oh","sequence":"additional","affiliation":[{"name":"Stan Richards School of Advertising & Public Relations, The University of Texas at Austin , TX,","place":["United States"]}]}],"member":"286","published-online":{"date-parts":[[2025,11,2]]},"reference":[{"key":"2025110220054945600_zmaf021-B1","doi-asserted-by":"publisher","author":"Ackerman","year":"1999","DOI":"10.1145\/336992.336995"},{"key":"2025110220054945600_zmaf021-B2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.jretai.2014.09.005","article-title":"Unraveling the personalization paradox: The effect of information collection and trust-building strategies on online Advertisement Effectiveness","volume":"91","author":"Aguirre","year":"2015","journal-title":"Journal of Retailing"},{"key":"2025110220054945600_zmaf021-B3","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1108\/JCM-06-2015-1458","article-title":"The personalization-privacy paradox: Implications for new media","volume":"33","author":"Aguirre","year":"2016","journal-title":"Journal of Consumer Marketing"},{"key":"2025110220054945600_zmaf021-B4","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1002\/pon.4510","article-title":"Protection motivation theory in predicting intention to receive cervical cancer screening in rural Chinese women","volume":"27","author":"Bai","year":"2018","journal-title":"Psycho-oncology"},{"key":"2025110220054945600_zmaf021-B5","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.copsyc.2020.05.004","article-title":"Towards an integration of individualistic, networked, and institutional approaches to online disclosure and privacy in a networked ecology","volume":"36","author":"Bazarova","year":"2020","journal-title":"Current Opinion in Psychology"},{"key":"2025110220054945600_zmaf021-B6","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1177\/0093650218800915","article-title":"Exploring motivations for online privacy protection behavior: Insights from panel data","volume":"48","author":"Boerman","year":"2021","journal-title":"Communication Research"},{"key":"2025110220054945600_zmaf021-B7","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1177\/00936502231177786","article-title":"How can we increase privacy protection behavior? A longitudinal experiment testing three intervention strategies","volume":"51","author":"Boerman","year":"2024","journal-title":"Communication Research"},{"key":"2025110220054945600_zmaf021-B8","doi-asserted-by":"publisher","DOI":"10.1177\/20539517211065368","article-title":"The chilling effects of digital dataveillance: A theoretical model and an empirical research agenda","volume":"9","author":"B\u00fcchi","year":"2022","journal-title":"Big Data and Society"},{"key":"2025110220054945600_zmaf021-B9","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2019.105367","article-title":"The chilling effects of algorithmic profiling: Mapping the issues","volume":"36","author":"B\u00fcchi","year":"2020","journal-title":"Computer Law and Security Review"},{"key":"2025110220054945600_zmaf021-B10","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1177\/0163443715584098","article-title":"Non-participation in digital media: Toward a framework of mediated political action","volume":"37","author":"Casemajor","year":"2015","journal-title":"Media, Culture & Society"},{"key":"2025110220054945600_zmaf021-B11","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1080\/10705510701301834","article-title":"Sensitivity of goodness of fit indexes to lack of measurement invariance","volume":"14","author":"Chen","year":"2007","journal-title":"Structural Equation Modeling: A Multidisciplinary Journal"},{"key":"2025110220054945600_zmaf021-B12","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1089\/cyber.2014.0456","article-title":"Couldn\u2019t or wouldn\u2019t? The influence of privacy concerns and self-efficacy in privacy management on privacy protection","volume":"30","author":"Chen","year":"2015","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"2025110220054945600_zmaf021-B13","doi-asserted-by":"publisher","first-page":"2011","DOI":"10.1080\/0144929X.2022.2106307","article-title":"The privacy protection behaviours of the mobile app users: Exploring the role of neuroticism and protection motivation theory","volume":"42","author":"Chennamaneni","year":"2023","journal-title":"Behaviour and Information Technology"},{"key":"2025110220054945600_zmaf021-B14","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1093\/ijlit\/eai026","article-title":"The lion, the dragon and the wardrobe guarding the doorway to information and communications privacy on the internet: A comparative case study of Hong Kong and Singapore: Two differing Asian approaches","volume":"14","author":"Chik","year":"2005","journal-title":"International Journal of Law and Information Technology"},{"key":"2025110220054945600_zmaf021-B15","doi-asserted-by":"publisher","first-page":"2079","DOI":"10.1002\/asi.21122","article-title":"Blogging, communication, and privacy management: Development of the blogging privacy management measure","volume":"60","author":"Child","year":"2009","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"2025110220054945600_zmaf021-B16","doi-asserted-by":"publisher","DOI":"10.1145\/3193120","article-title":"Collective privacy management in social media: A cross-cultural validation","volume":"25","author":"Cho","year":"2018","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"2025110220054945600_zmaf021-B17","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1177\/1461444808101618","article-title":"A multinational study on online privacy: Global concerns and local responses","volume":"11","author":"Cho","year":"2009","journal-title":"New Media and Society"},{"key":"2025110220054945600_zmaf021-B18","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1089\/cpb.2008.0226","article-title":"Information disclosure and control on Facebook: Are they two sides of the same coin or two different processes?","volume":"12","author":"Christofides","year":"2009","journal-title":"Cyberpsychology & Behavior"},{"key":"2025110220054945600_zmaf021-B19","author":"Conger","year":"2021"},{"key":"2025110220054945600_zmaf021-B20","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1111\/jcc4.12163","article-title":"An extended privacy calculus model for SNSs: Analyzing self-disclosure and self-withdrawal in a representative U.S. sample","volume":"21","author":"Dienlin","year":"2016","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2025110220054945600_zmaf021-B21","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716665128","article-title":"Algorithms and their others: Algorithmic culture in context","volume":"3","author":"Dourish","year":"2016","journal-title":"Big Data & Society"},{"key":"2025110220054945600_zmaf021-B22","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1093\/jcmc\/zmaa013","article-title":"Why we don\u2019t click: Interrogating the relationship between viewing and clicking in social media contexts by exploring the \u201cnon-click","volume":"25","author":"Ellison","year":"2020","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2025110220054945600_zmaf021-B23","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1177\/0165025419881721","article-title":"Finding latent groups in observed data: A primer on latent profile analysis in Mplus for applied researchers","volume":"44","author":"Ferguson","year":"2019","journal-title":"International Journal of Behavioral Development"},{"key":"2025110220054945600_zmaf021-B24","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2307\/3151312","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","author":"Fornell","year":"1981","journal-title":"Journal of Marketing Research"},{"key":"2025110220054945600_zmaf021-B25","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1080\/02650487.2016.1239878","article-title":"Exploring how consumers cope with online behavioral advertising","volume":"36","author":"Ham","year":"2017","journal-title":"International Journal of Advertising"},{"key":"2025110220054945600_zmaf021-B26","volume-title":"Multivariate data analysis","author":"Hair","year":"2010","edition":"7th ed."},{"key":"2025110220054945600_zmaf021-B27","doi-asserted-by":"publisher","DOI":"10.1177\/20539517241232629","article-title":"Inequalities in privacy cynicism: An intersectional analysis of agency constraints","volume":"11","author":"Hoffmann","year":"2024","journal-title":"Big Data and Society"},{"key":"2025110220054945600_zmaf021-B28","volume-title":"Culture\u2019s consequences: International differences in work-related values","author":"Hofstede","year":"1984"},{"key":"2025110220054945600_zmaf021-B29","volume-title":"Culture\u2019s consequences: Comparing values, behaviors, institutions and organizations across nations","author":"Hofstede","year":"2001","edition":"2nd ed."},{"key":"2025110220054945600_zmaf021-B30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10705519909540118","article-title":"Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives","volume":"6","author":"Hu","year":"1999","journal-title":"Structural Equation Modeling: A Multidisciplinary Journal"},{"key":"2025110220054945600_zmaf021-B31","doi-asserted-by":"publisher","DOI":"10.1080\/21645515.2023.2211319","article-title":"Expanding Protection Motivation Theory to explain vaccine uptake among United Kingdom and Taiwan populations","volume":"19","author":"Huang","year":"2023","journal-title":"Human Vaccines & Immunotherapeutics"},{"key":"2025110220054945600_zmaf021-B32","volume-title":"Singapore\u2014Information and telecommunications technology","author":"International Trade Administration","year":"2024"},{"key":"2025110220054945600_zmaf021-B33","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2020.1778787","article-title":"The smart wearables-privacy paradox: A cluster analysis of smartwatch users","volume":"40","author":"Kang","year":"2020","journal-title":"Behaviour & Information Technology"},{"key":"2025110220054945600_zmaf021-B34","doi-asserted-by":"publisher","first-page":"e48986","DOI":"10.2196\/48986","article-title":"The roles of trust in government and sense of community in the COVID-19 contact tracing privacy calculus: Mixed method study using a 2-wave survey and in-depth interviews","volume":"12","author":"Kang","year":"2024","journal-title":"JMIR Mhealth Uhealth"},{"key":"2025110220054945600_zmaf021-B35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/jcmc\/zmac014","article-title":"AI agency vs. human agency: Understanding human\u2013AI interactions on TikTok and their implications for user engagement","volume":"27","author":"Kang","year":"2022","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2025110220054945600_zmaf021-B36","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1177\/14614448211026611","article-title":"Communication privacy management for smart speaker use: Integrating the role of privacy self-efficacy and the multidimensional view","volume":"25","author":"Kang","year":"2023","journal-title":"New Media & Society"},{"key":"2025110220054945600_zmaf021-B37","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.bushor.2018.08.004","article-title":"Siri, Siri, in my hand: Who\u2019s the fairest in the land? On the interpretations, illustrations, and implications of artificial intelligence","volume":"62","author":"Kaplan","year":"2019","journal-title":"Business Horizons"},{"key":"2025110220054945600_zmaf021-B38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2023.103120","article-title":"Dataveillance imaginaries and their role in chilling effects online","volume":"179","author":"Kappeler","year":"2023","journal-title":"International Journal of Human Computer Studies"},{"key":"2025110220054945600_zmaf021-B39","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2025-0057","article-title":"Privacy perceptions and behaviors towards targeted advertising on social media: A cross-country study on the effect of culture and religion","volume":"2025","author":"Kaushik","year":"2025","journal-title":"Proceedings on Privacy Enhancing Technologies Symposium"},{"key":"2025110220054945600_zmaf021-B40","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1057\/jit.2010.6","article-title":"Online social networks: Why we disclose","volume":"25","author":"Krasnova","year":"2010","journal-title":"Journal of Information Technology"},{"key":"2025110220054945600_zmaf021-B41","volume-title":"The Significance of Algorithmic Selection for Everyday Life: The Case of Switzerland Report 4","author":"Latzer","year":"2020"},{"key":"2025110220054945600_zmaf021-B42","doi-asserted-by":"publisher","first-page":"e30462","DOI":"10.2196\/30462","article-title":"The influence of normative perceptions on the uptake of the COVID-19 TraceTogether digital contact tracing system: Cross-sectional study","volume":"7","author":"Lee","year":"2021","journal-title":"JMIR Public Health and Surveillance"},{"key":"2025110220054945600_zmaf021-B43","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.chb.2016.05.056","article-title":"Personalization\u2013privacy paradox and consumer conflict with the use of location-based mobile commerce","volume":"63","author":"Lee","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"2025110220054945600_zmaf021-B44","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2004010102","article-title":"American and Taiwanese perceptions concerning privacy, trust and behavioral intentions in electronic commerce","volume":"12","author":"Liu","year":"2004","journal-title":"Journal of Global Information Management,"},{"key":"2025110220054945600_zmaf021-B45","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1177\/00220221221130978","article-title":"Complexifying individualism versus collectivism and West versus East: Exploring global diversity in perspectives on self and other in the Gallup World Poll","volume":"54","author":"Lomas","year":"2023","journal-title":"Journal of Cross-Cultural Psychology"},{"key":"2025110220054945600_zmaf021-B46","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/0022-1031(83)90023-9","article-title":"Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change","volume":"19","author":"Maddux","year":"1983","journal-title":"Journal of Experimental Social Psychology"},{"key":"2025110220054945600_zmaf021-B47","doi-asserted-by":"publisher","DOI":"10.1177\/2056305116634368","article-title":"Disclosure management on social network sites: Individual privacy perceptions and user-directed privacy strategies","volume":"2","author":"Masur","year":"2016","journal-title":"Social Media + Society"},{"key":"2025110220054945600_zmaf021-B48","doi-asserted-by":"publisher","author":"Meier","year":"2020","DOI":"10.1145\/3400806.3400810"},{"key":"2025110220054945600_zmaf021-B49","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1111\/j.1559-1816.2000.tb02308.x","article-title":"Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory","volume":"30","author":"Milne","year":"2000","journal-title":"Journal of Applied Social Psychology"},{"key":"2025110220054945600_zmaf021-B50","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1177\/109442811562114","article-title":"Multiple-group analysis of similarity in latent profile solutions","volume":"19","author":"Morin","year":"2015","journal-title":"Organizational Research Methods"},{"key":"2025110220054945600_zmaf021-B51","doi-asserted-by":"publisher","first-page":"113323","DOI":"10.1016\/j.dss.2020.113323","article-title":"Effectiveness of privacy assurance mechanisms in users\u2019 privacy protection on social networking sites from the perspective of protection motivation theory","volume":"135","author":"Mousavi","year":"2020","journal-title":"Decision Support Systems"},{"key":"2025110220054945600_zmaf021-B52","doi-asserted-by":"publisher","DOI":"10.1177\/20539517231213823","article-title":"Understanding user interactions and perceptions of AI risk in Singapore","volume":"10","author":"Neyazi","year":"2023","journal-title":"Big Data & Society"},{"key":"2025110220054945600_zmaf021-B53","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1080\/10705510701575396","article-title":"Deciding on the number of classes in latent class analysis and growth mixture modeling: A Monte Carlo simulation study","volume":"14","author":"Nylund","year":"2007","journal-title":"Structural Equation Modeling: A Multidisciplinary Journal"},{"key":"2025110220054945600_zmaf021-B54","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmad035","article-title":"Attitudinal and behavioral correlates of algorithmic awareness among German and U.S. social media users","volume":"28","author":"Oeldorf-Hirsch","year":"2023","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2025110220054945600_zmaf021-B55","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of privacy: Dialectics of disclosure","author":"Petronio","year":"2002"},{"key":"2025110220054945600_zmaf021-B56","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.copsyc.2019.08.009","article-title":"Conceptualization and operationalization: Utility of communication privacy management theory","volume":"31","author":"Petronio","year":"2020","journal-title":"Current Opinion in Psychology"},{"key":"2025110220054945600_zmaf021-B57","doi-asserted-by":"publisher","DOI":"10.1177\/2056305120915613","article-title":"Thinking outside the black-box: The case for \u201cAlgorithmic Sovereignty\u201d in social media","volume":"6","author":"Reviglio","year":"2020","journal-title":"Social Media and Society"},{"key":"2025110220054945600_zmaf021-B58","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change","volume":"91","author":"Rogers","year":"1975","journal-title":"The Journal of Psychology"},{"key":"2025110220054945600_zmaf021-B59","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1177\/10949968221136555","article-title":"The effects of cultural differences on consumers\u2019 willingness to share personal information","volume":"58","author":"Schumacher","year":"2022","journal-title":"Journal of Interactive Marketing"},{"key":"2025110220054945600_zmaf021-B60","doi-asserted-by":"publisher","first-page":"153365","DOI":"10.1109\/ACCESS.2019.2948401","article-title":"Computer estimation of customer similarity with Facebook lookalikes: Advantages and disadvantages of hyper-targeting","volume":"7","author":"Semer\u00e1dov\u00e1","year":"2019","journal-title":"IEEE Access"},{"key":"2025110220054945600_zmaf021-B61","doi-asserted-by":"publisher","first-page":"102494","DOI":"10.1016\/j.ijinfomgt.2022.102494","article-title":"Algorithm awareness: Why user awareness is critical for personal privacy in the adoption of algorithmic platforms?","volume":"65","author":"Shin","year":"2022","journal-title":"International Journal of Information Management"},{"key":"2025110220054945600_zmaf021-B62","doi-asserted-by":"publisher","first-page":"5702","DOI":"10.1177\/14614448221138973","article-title":"Learning to like TikTok \u2026 and not: Algorithm awareness as process","volume":"26","author":"Siles","year":"2024","journal-title":"New Media & Society"},{"key":"2025110220054945600_zmaf021-B63","author":"Singapore Statutes Online","year":"2020"},{"key":"2025110220054945600_zmaf021-B64","first-page":"24","article-title":"Chilling effects as a result of corporate surveillance in digital communication: A comparison between American and Dutch media users","volume":"18","author":"Strycharz","year":"2023","journal-title":"International Journal of Communication"},{"key":"2025110220054945600_zmaf021-B65","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.107949","article-title":"Is knowledge power? Testing whether knowledge affects chilling effects and privacy-protective behaviors using browser histories","volume":"150","author":"Stubenvoll","year":"2024","journal-title":"Computers in Human Behavior"},{"key":"2025110220054945600_zmaf021-B66","volume-title":"Individualism & collectivism","author":"Triandis","year":"1995"},{"key":"2025110220054945600_zmaf021-B67","doi-asserted-by":"publisher","DOI":"10.1177\/00936502211060984","article-title":"Privacy cynicism and its role in privacy decision-making","volume":"51","author":"van Ooijen","year":"2022","journal-title":"Communication Research"},{"key":"2025110220054945600_zmaf021-B68","doi-asserted-by":"publisher","first-page":"1679","DOI":"10.1108\/ITP-01-2018-0020","article-title":"Retaining users after privacy invasions: The roles of institutional privacy assurances and threat-coping appraisal in mitigating privacy concerns","volume":"32","author":"Wang","year":"2019","journal-title":"Information Technology & People"},{"key":"2025110220054945600_zmaf021-B69","first-page":"1","author":"Wilkinson","year":"2022"},{"key":"2025110220054945600_zmaf021-B70","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.chb.2015.05.059","article-title":"See you, see me: Teenagers\u2019 self-disclosure and regret of posting on social network site","volume":"52","author":"Xie","year":"2015","journal-title":"Computers in Human Behavior"},{"key":"2025110220054945600_zmaf021-B71","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.dss.2010.11.017","article-title":"The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing","volume":"51","author":"Xu","year":"2011","journal-title":"Decision Support Systems"},{"key":"2025110220054945600_zmaf021-B72","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1080\/1369118X.2013.777757","article-title":"Privacy protection strategies on Facebook: The Internet privacy paradox revisited","volume":"16","author":"Young","year":"2013","journal-title":"Information, Communication & Society"},{"key":"2025110220054945600_zmaf021-B73","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1111\/deci.12243","article-title":"Exploring the effects of the privacy-handling management styles of social networking sites on user satisfaction: A conflict management perspective","volume":"48","author":"Zhang","year":"2017","journal-title":"Decision Sciences"}],"container-title":["Journal of Computer-Mediated Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/jcmc\/article-pdf\/30\/6\/zmaf021\/65093932\/zmaf021.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/jcmc\/article-pdf\/30\/6\/zmaf021\/65093932\/zmaf021.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T01:05:53Z","timestamp":1762131953000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jcmc\/article\/doi\/10.1093\/jcmc\/zmaf021\/8313012"}},"subtitle":[],"editor":[{"given":"Jessica","family":"Vitak","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,10,8]]},"references-count":73,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10,8]]}},"URL":"https:\/\/doi.org\/10.1093\/jcmc\/zmaf021","relation":{},"ISSN":["1083-6101"],"issn-type":[{"value":"1083-6101","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025,11]]},"published":{"date-parts":[[2025,10,8]]},"article-number":"zmaf021"}}