{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T09:15:55Z","timestamp":1775639755623,"version":"3.50.1"},"reference-count":25,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper is to report on results of an investigation into the impact of adding privacy salient information (defined through the theory of planned behaviour) into the user interface (UI) of a faux social network. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 Participants were asked to create their profiles on a new social network specifically for Nottingham Trent University students by answering a series of questions that vary in the sensitivity of personal information requested. A treatment is designed that allows participants to review their answers and make amendments based on suggestions from the treatment. A dynamic privacy score that improves as amendments are made is designed to encourage privacy-oriented behaviour. Results from the treatment group are compared to a control group. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 Participants within the treatment group disclosed less than those in the control with statistical significance. The more sensitive questions in particular were answered less when compared to the control, suggesting that participants were making more privacy-conscious decisions. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 Work within this paper suggests that simple UI changes can promote more privacy-conscious behaviour. These simple changes could provide a low-cost method to ensuring the Internet safety of a wide range of users. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 This study provides a clear definition of privacy salient UI mechanisms based on a well-established theory of behaviour and examines their potential effect on end-users through a novel experiment. Results and methods from this work can enable researchers to better understand privacy behaviour.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/ics-10-2014-0068","type":"journal-article","created":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T19:42:32Z","timestamp":1444678952000},"page":"382-393","source":"Crossref","is-referenced-by-count":9,"title":["Privacy as a secondary goal problem: an experiment examining control"],"prefix":"10.1108","volume":"23","author":[{"given":"Thomas","family":"Hughes-Roberts","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2020122004561954600_b1","doi-asserted-by":"crossref","unstructured":"Acquisti, A.\n                and \n                  Gross, R.\n                (2006), \u201cImagined communities: awareness, information sharing, and privacy on the facebook\u201d, \n                  Proceedings of the 6th Workshop on Privacy Enhancing Technologies\n               .","DOI":"10.1007\/11957454_3"},{"key":"key2020122004561954600_b2","doi-asserted-by":"crossref","unstructured":"Ajzen, I.\n                (1991), \u201cThe theory of planned behaviour\u201d, \n                  Organizational Behaviour and Human Decision Processes\n               , Vol. 50, pp. 179-211.","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"key2020122004561954600_b3","doi-asserted-by":"crossref","unstructured":"Amichai-Hamburger, Y.\n                and \n                  Gideon, V.\n                (2010), \u201cSocial network use and personality\u201d, \n                  Computers in Human Behavior\n               , Vol. 26 No. 6, pp. 1289-1295.","DOI":"10.1016\/j.chb.2010.03.018"},{"key":"key2020122004561954600_b4","doi-asserted-by":"crossref","unstructured":"Bonneau, J.\n               , \n                  Anderson, J.\n                and \n                  Church, L.\n                (2009), \u201cPrivacy suites: shared privacy for social networks\u201d, \n                  5th Symposium on Usable Privacy and Security\n               , New York, NY.","DOI":"10.1145\/1572532.1572569"},{"key":"key2020122004561954600_b5","doi-asserted-by":"crossref","unstructured":"Brandimarte, M.\n               , \n                  Acquisti, A.\n                and \n                  Loewenstien, G.\n                (2012), \n                  Misplaced Confidences: Privacy and the Control Paradox\n               , Workshop on the Economics of Information Security, Harvard.","DOI":"10.1177\/1948550612455931"},{"key":"key2020122004561954600_b6","unstructured":"Breakwell, G.M.\n                (2006), \n                  Research Methods in Psychology\n               , Sage Publications, Oxford."},{"key":"key2020122004561954600_b7","doi-asserted-by":"crossref","unstructured":"Debatin, B.\n               , \n                  Lovejoy, J.P.\n               , \n                  Horn, A.K.\n                and \n                  Hughes, B.N.\n                (2009), \u201cFacebook and online privacy: attitudes, behaviors, and unintended consequences\u201d, \n                  Journal of Computer-Mediated Communication\n               , Vol. 15 No. 1, pp. 83-108.","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"key2020122004561954600_b8","doi-asserted-by":"crossref","unstructured":"Fang, L.\n                and \n                  LeFevre, K.\n                (2010), \u201cPrivacy wizards for social networking sites\u201d, Proceedings of the 19th International Conference on World wide Web, New York, NY.","DOI":"10.1145\/1772690.1772727"},{"key":"key2020122004561954600_b9","doi-asserted-by":"crossref","unstructured":"Fogg, B.J.\n                (2003), \n                  Persuasive Technology: Using Computers to Change what We Think and Do\n               , Morgan Kaufmann, San Francisco, CA.","DOI":"10.1145\/764008.763957"},{"key":"key2020122004561954600_b10","doi-asserted-by":"crossref","unstructured":"Fogg, B.J.\n                (2009), \n                  The Behaviour Grid: 35 Ways Behaviour Can Change\n               , PERSUASIVE, Clairemont, CA.","DOI":"10.1145\/1541948.1542001"},{"key":"key2020122004561954600_b11","unstructured":"Fogg, B.J.\n                and \n                  Iizawa, D.\n                (2008), in \n                  Oinas-Kukkonen, H. et al.\n                  \n                (Eds), \n                  Online Persuasion in Facebook and Mixi: A Cross-Cultural Comparison\n               , PERSUASIVE, Berlin, pp. 35-46."},{"key":"key2020122004561954600_b12","doi-asserted-by":"crossref","unstructured":"Houghton, D.J.\n                and \n                  Joinson, A.\n                (2010), \u201cPrivacy, social network sites, and social relations\u201d, \n                  Journal of Technology in Human Services\n               , Vol. 28 Nos 1\/2, pp. 74-94.","DOI":"10.1080\/15228831003770775"},{"key":"key2020122004561954600_b13","unstructured":"Jacko, J.A. and A. Sears\n                (2003), \n                  The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications\n               , Lawrence Erlbaum and Associates, Mahwah, NJ."},{"key":"key2020122004561954600_b14","doi-asserted-by":"crossref","unstructured":"John, L.\n               , \n                  Alessandro, A.\n                and \n                  George, L.\n                (2009), \u201cThe best of strangers: context-dependent willingness to divulge personal information\u201d, Social Science Research Network.","DOI":"10.2139\/ssrn.1430482"},{"key":"key2020122004561954600_b15","doi-asserted-by":"crossref","unstructured":"Knijnenburg, B.P.\n               , \n                  Kobsa, A.\n                and \n                  Jin, H.\n                (2013), \u201cDimensionality of information disclosure behavior\u201d, \n                  International Journal of Human-Computer Studies\n               , Vol. 71 No. 12, pp. 1144-1162.","DOI":"10.1016\/j.ijhcs.2013.06.003"},{"key":"key2020122004561954600_b16","doi-asserted-by":"crossref","unstructured":"Kolter, J.\n                and \n                  Pernul, G.\n                (2009), \u201cGenerating user-understandable privacy preferences\u201d, International Conference on Availability, Reliability and Security, Fukuoka, pp. 299-306.","DOI":"10.1109\/ARES.2009.89"},{"key":"key2020122004561954600_b17","doi-asserted-by":"crossref","unstructured":"Lew, L.\n               , \n                  Nguyen, T.\n               , \n                  Messing, S.\n                and \n                  Westwood, S.\n                (2011), \u201cOf course I Wouldnt do that in real life: advancing the arguments for increasing realism in HCI Experiments\u201d, \n                  Computer Human Interaction\n               , Association for Computing Machinery, Vancouver, BC.","DOI":"10.1145\/1979742.1979621"},{"key":"key2020122004561954600_b18","doi-asserted-by":"crossref","unstructured":"Livingstone, S.\n                (2008), \u201cTaking risky opportunities in youthful content creation: teenagers\u2019 use of social networking sites for intimacy, privacy and self-expression\u201d, \n                  New Media and Society\n               , Vol. 10 No. 3, pp. 393-411.","DOI":"10.1177\/1461444808089415"},{"key":"key2020122004561954600_b19","doi-asserted-by":"crossref","unstructured":"Masiello, B.\n                (2009), \u201cDeconstructing the privacy experience\u201d, \n                  IEEE Security and Privacy\n               , Vol. 7 No. 4, pp. 68-70.","DOI":"10.1109\/MSP.2009.88"},{"key":"key2020122004561954600_b20","unstructured":"Miller, R.E.\n               , \n                  Salmona, M.\n                and \n                  Melton, J.\n                (2011), \u201cStudents and social networking site: a model of inappropriate posting\u201d, Proceedings of the Southern Association for Information Systems Conference, Atlanta."},{"key":"key2020122004561954600_b21","doi-asserted-by":"crossref","unstructured":"Portes, A.\n                (1998), \u201cSocial capital: its origins and applications in modern sociology\u201d, \n                  Annual Review of Sociology\n               , Vol. 24, pp. 1-24.","DOI":"10.1146\/annurev.soc.24.1.1"},{"key":"key2020122004561954600_b22","doi-asserted-by":"crossref","unstructured":"Rosenblum, D.\n                (2007), \u201cWhat anyone can know: the privacy risks of social networking\u201d, \n                  IEEE Security and Privacy\n               , Vol. 5 No. 3, pp. 40-49.","DOI":"10.1109\/MSP.2007.75"},{"key":"key2020122004561954600_b23","doi-asserted-by":"crossref","unstructured":"Strater, K.\n                and \n                  Lipford, H.R.\n                (2008), \u201cStrategies and struggles with privacy in an online social networking community\u201d, Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction, British Computing Society, Swinton.","DOI":"10.14236\/ewic\/HCI2008.11"},{"key":"key2020122004561954600_b24","doi-asserted-by":"crossref","unstructured":"Tamir, D.I.\n                and \n                  Mitchell, J.P.\n                (2012), \u201cDisclosing information about the self is intrinsically rewarding\u201d, \n                  Proceedings of the National Academy of Sciences\n               , Vol. 109 No. 21, pp. 8038-8043.","DOI":"10.1073\/pnas.1202129109"},{"key":"key2020122004561954600_b25","unstructured":"Ur, B.\n               , \n                  Kelley, P.G.\n               , \n                  Komanduri, S.\n               , \n                  Lee, J.\n               , \n                  Maass, M.\n               , \n                  Mazurek, M.L.\n               , \n                  Passaro, T.\n               , \n                  Shay, R.\n               , \n                  Vidas, T.\n               , \n                  Bauer, L.\n               , \n                  Christin, N.\n                and \n                  Cranor, L.F.\n                (2014), \u201cHow does your password measure up? The effect of strength meters on password creation\u201d, Proceeding Security 12 Proceedings of the 21st USENIX Conference on Security Symposium, Berkeley, CA."}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/ICS-10-2014-0068","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-10-2014-0068\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-10-2014-0068\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:14Z","timestamp":1753406594000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/23\/4\/382-393\/113604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,10,12]]}},"alternative-id":["10.1108\/ICS-10-2014-0068"],"URL":"https:\/\/doi.org\/10.1108\/ics-10-2014-0068","relation":{},"ISSN":["2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2015,10,12]]}}}