{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T02:08:03Z","timestamp":1772676483222,"version":"3.50.1"},"reference-count":64,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T00:00:00Z","timestamp":1621555200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2021,8,17]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Social media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user\u2019s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>Fourteen university students participated in a mixed-methods experiment, where responses to Likert-type scale items were combined with responses to interview questions to provide insight into the cost\u2013benefit analysis users conduct when disclosing information online.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by fear of missing out (FOMO) further allows users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This study provides insight into privacy and information disclosure on social media in South Africa. To the knowledge of the researchers, this is the first study to include a combination of the theory of planned behaviour and the privacy calculus model, together with the antecedent factors of personal valuation of information, trust in the social media provider, FOMO.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-10-2020-0168","type":"journal-article","created":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T13:30:03Z","timestamp":1621431003000},"page":"413-434","source":"Crossref","is-referenced-by-count":11,"title":["Understanding the disclosure of personal data online"],"prefix":"10.1108","volume":"29","author":[{"given":"Heather J.","family":"Parker","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Flowerday","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,5,21]]},"reference":[{"issue":"6221","key":"key2021081408083158700_ref001","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.aaa1465","article-title":"Privacy and human behavior in the age of information","volume":"347","year":"2015","journal-title":"Science"},{"issue":"5","key":"key2021081408083158700_ref002","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1108\/ICS-11-2016-0085","article-title":"Measuring attitude towards personal data for adaptive cybersecurity","volume":"25","year":"2017","journal-title":"Information and Computer Security"},{"issue":"2","key":"key2021081408083158700_ref003","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","year":"1991","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"key2021081408083158700_ref004","first-page":"1","article-title":"The privacy calculus under positive and negative mood states","volume-title":"Proceedings of the 39th International Conference on Information Systems","year":"2018"},{"issue":"2","key":"key2021081408083158700_ref005","doi-asserted-by":"crossref","first-page":"71","DOI":"10.14201\/ADCAIJ2018727180","article-title":"The value of our personal data in the big data and the internet of all things era","volume":"7","year":"2018","journal-title":"Advances in Distributed Computing and Artificial Intelligence Journal"},{"issue":"3","key":"key2021081408083158700_ref006","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1108\/ITP-10-2014-0232","article-title":"Information disclosure of social media users: does control over personal information, user awareness and security notices matter?","volume":"28","year":"2015","journal-title":"Information Technology and People"},{"key":"key2021081408083158700_ref0100","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.chb.2016.05.083","article-title":"\u2018I don\u2019t want to miss a thing\u2019: adolescents\u2019 fear of missing out and its relationship to adolescents\u2019 social needs, Facebook use, and Facebook related stress","volume":"64","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"key2021081408083158700_ref0101","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1191\/1478088706qp063oa","article-title":"Using thematic analysis in psychology","volume":"3","year":"2006","journal-title":"Qualitative Research in Psychology"},{"key":"key2021081408083158700_ref007","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.chb.2013.07.059","article-title":"Visiting theories that predict college students\u2019 self-disclosure on Facebook","volume":"30","year":"2014","journal-title":"Computers in Human Behavior"},{"key":"key2021081408083158700_ref008","article-title":"Understanding perceived privacy: a privacy boundary management model","volume-title":"Proceedings of the 19th Pacific Asia Conference on Information Systems","year":"2015"},{"issue":"2","key":"key2021081408083158700_ref009","doi-asserted-by":"crossref","first-page":"33","DOI":"10.4018\/JOEUC.2016040103","article-title":"The influence of social presence, social exchange and feedback features on SNS continuous use: the Facebook context","volume":"28","year":"2016","journal-title":"Journal of Organizational and End User Computing"},{"issue":"1","key":"key2021081408083158700_ref010","doi-asserted-by":"crossref","first-page":"146","DOI":"10.4218\/etrij.2017-0082","article-title":"Determinants of the intention to protect personal information among Facebook users","volume":"40","year":"2018","journal-title":"ETRI Journal"},{"key":"key2021081408083158700_ref0102","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.chb.2015.02.042","article-title":"Surfing on social network sites: a comprehensive instrument to evaluate online self-disclosure and related attitudes","volume":"49","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2021081408083158700_ref011","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","article-title":"Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation","volume":"10","year":"1999","journal-title":"Organization Science"},{"issue":"3","key":"key2021081408083158700_ref012","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1002\/ejsp.2049","article-title":"Is the privacy paradox a relic of the past? An in\u2010depth analysis of privacy attitudes and privacy behaviors","volume":"45","year":"2015","journal-title":"European Journal of Social Psychology"},{"issue":"1","key":"key2021081408083158700_ref013","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","year":"2006","journal-title":"Information Systems Research"},{"issue":"4","key":"key2021081408083158700_ref014","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1177\/0022022119839145","article-title":"Why do people experience the fear of missing out (FOMO)? Exposing the link between the self and the FOMO through Self-Construal","volume":"50","year":"2019","journal-title":"Journal of Cross-Cultural Psychology"},{"key":"key2021081408083158700_ref015","article-title":"Millennials vs generation Z on social media","year":"2019"},{"key":"key2021081408083158700_ref016","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.chb.2014.11.083","article-title":"The dark side of social networking sites: an exploration of the relational and psychological stressors associated with Facebook use and affordances","volume":"45","year":"2015","journal-title":"Computers in Human Behavior"},{"key":"key2021081408083158700_ref017","volume-title":"The SAGE Encyclopedia of Educational Research, Measurement, and Evaluation","year":"2018"},{"issue":"5","key":"key2021081408083158700_ref018","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/S1361-3723(14)70491-9","article-title":"Security literacy: the missing link in today's online society?","volume":"2014","year":"2014","journal-title":"Computer Fraud and Security"},{"key":"key2021081408083158700_ref019","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.cose.2018.04.002","article-title":"Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior","volume":"77","year":"2018","journal-title":"Computers and Security"},{"key":"key2021081408083158700_ref020","article-title":"Ad personalization","author":"Google Ad Settings","year":"2020"},{"key":"key2021081408083158700_ref021","first-page":"3737","article-title":"\u2018What can I really do?\u2019 Explaining the privacy paradox with online apathy","volume":"10","year":"2016","journal-title":"International Journal of Communication"},{"issue":"2","key":"key2021081408083158700_ref022","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1089\/cyber.2012.0041","article-title":"Predicting adolescents' disclosure of personal information in exchange for commercial incentives: an application of an extended theory of planned behavior","volume":"16","year":"2013","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"key2021081408083158700_ref023","first-page":"1922","article-title":"Making decisions about self-disclosure in online social networks","volume-title":"Proceedings of the 50th HI International Conference on System Sciences","year":"2017"},{"key":"key2021081408083158700_ref024","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/j.chb.2016.02.091","article-title":"Understanding the privacy behavior of adolescents on Facebook: the role of peers, popularity and trust","volume":"60","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"key2021081408083158700_ref025","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1016\/j.chb.2016.12.042","article-title":"Privacy concerns on social networking sites: interplay among posting types, content, and audiences","volume":"69","year":"2017","journal-title":"Computers in Human Behavior"},{"key":"key2021081408083158700_ref026","first-page":"1","article-title":"Privacy paradox revised: pre-existing attitudes, psychological ownership, and actual disclosure privacy paradox","volume-title":"Proceedings of the 35th International Conference on Information Systems","year":"2014"},{"key":"key2021081408083158700_ref027","article-title":"Death to the privacy calculus?","year":"2017"},{"key":"key2021081408083158700_ref028","first-page":"1","article-title":"\u2018Generation Facebook\u2019 \u2013 a cognitive calculus model of teenage user behavior on social network sites","volume-title":"Proceedings of the 17th Americas Conference on Information Systems","year":"2011"},{"key":"key2021081408083158700_ref029","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.copsyc.2019.08.003","article-title":"Mastering the challenge of balancing self-disclosure and privacy in social media","volume":"31","year":"2020","journal-title":"Current Opinion in Psychology"},{"issue":"2","key":"key2021081408083158700_ref030","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1057\/jit.2010.6","article-title":"Online social networks: why We disclose","volume":"25","year":"2010","journal-title":"Journal of Information Technology"},{"key":"key2021081408083158700_ref031","first-page":"1","article-title":"Privacy calculus on social networking sites: explorative evidence from Germany and USA","volume-title":"Proceedings of the 43rd HI International Conference on System Sciences","year":"2010"},{"issue":"9","key":"key2021081408083158700_ref032","doi-asserted-by":"crossref","first-page":"862","DOI":"10.1016\/j.ijhcs.2013.01.005","article-title":"Why do people share their context information on social network services? A qualitative study and an experimental study on users' behavior of balancing perceived benefit and risk","volume":"71","year":"2013","journal-title":"International Journal of Human-Computer Studies"},{"issue":"1","key":"key2021081408083158700_ref033","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.dss.2012.06.010","article-title":"Theories in online information privacy research: a critical review and an integrated framework","volume":"54","year":"2012","journal-title":"Decision Support Systems"},{"issue":"3","key":"key2021081408083158700_ref034","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/j.im.2016.09.004","article-title":"Understanding factors affecting users\u2019 social networking site continuance: a gender difference perspective","volume":"54","year":"2017","journal-title":"Information and Management"},{"issue":"2","key":"key2021081408083158700_ref035","first-page":"299","article-title":"Norm evolution and violation on Facebook","volume":"14","year":"2012","journal-title":"NewMedia and Society"},{"key":"key2021081408083158700_ref036","first-page":"279","article-title":"Privacy awareness about information leakage: who knows what about me?","volume-title":"Proceedings of the 12th ACM Workshop on privacy in the electronic society","year":"2013"},{"key":"key2021081408083158700_ref037","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/978-3-319-78884-5_7","article-title":"The theory of situational privacy and self-disclosure","volume-title":"Situational Privacy and Self-Disclosure","year":"2019"},{"issue":"1","key":"key2021081408083158700_ref038","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1177\/1461444816654465","article-title":"Managing the virtual boundaries: online social networks, disclosure, and privacy behaviors","volume":"20","year":"2018","journal-title":"New Media and Society"},{"issue":"4","key":"key2021081408083158700_ref039","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1002\/asi.23206","article-title":"How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost","volume":"66","year":"2015","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"1","key":"key2021081408083158700_ref040","first-page":"71","article-title":"A holistic study of privacy in social networking sites","volume":"17","year":"2014","journal-title":"Academy of Information and Management Sciences Journal"},{"issue":"1","key":"key2021081408083158700_ref0103","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","article-title":"The privacy paradox: personal information disclosure intentions versus behaviors","volume":"41","year":"2007","journal-title":"Journal of consumer affairs"},{"key":"key2021081408083158700_ref041","first-page":"352","article-title":"Social information leakage: effects of awareness and peer pressure on user behavior","volume-title":"Proceedings of the 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust","year":"2014"},{"issue":"3","key":"key2021081408083158700_ref042","first-page":"1","article-title":"\u2018It\u2019s not like it\u2019s life or death or whatever\u2019: young people\u2019s understandings of social media data","volume":"4","year":"2018","journal-title":"Social Media + Society"},{"key":"key2021081408083158700_ref043","first-page":"271","article-title":"Impact of user awareness, trust, and privacy concerns on sharing personal information on social media: Facebook, Twitter, and Instagram","volume-title":"Proceedings of the 10th International Conference on Advanced Computer Science and Information Systems","year":"2018"},{"issue":"1","key":"key2021081408083158700_ref044","first-page":"1","article-title":"Contributing factors to increased susceptibility to social media phishing attacks","volume":"22","year":"2020","journal-title":"South African Journal of Information Management"},{"key":"key2021081408083158700_ref045","first-page":"226","article-title":"Privacy awareness: a means to solve the privacy paradox","volume-title":"The Future of Identity in the Information Society","year":"2009"},{"issue":"4","key":"key2021081408083158700_ref046","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1016\/j.chb.2013.02.014","article-title":"Motivational, emotional, and behavioral correlates of fear of missing out","volume":"29","year":"2013","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"key2021081408083158700_ref0105","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s10799-018-0295-2","article-title":"Understanding individuals\u2019 intentions to limit online personal information disclosures to protect their privacy: implications for organizations and public policy","volume":"20","year":"2019","journal-title":"Information Technology and Management"},{"key":"key2021081408083158700_ref047","first-page":"51","article-title":"Awareness of behavioral tracking and information privacy concern in Facebook and Google","volume-title":"Proceedings of the 10th Symposium On Usable Privacy and Security","year":"2014"},{"issue":"3","key":"key2021081408083158700_ref048","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1080\/10919392.2018.1482601","article-title":"Factors predicting attitude toward disclosing personal data online","volume":"28","year":"2018","journal-title":"Journal of Organizational Computing and Electronic Commerce"},{"key":"key2021081408083158700_ref049","first-page":"210","article-title":"Descriptive statistics","volume-title":"The SAGE Encyclopedia of Qualitative Research Methods","year":"2012"},{"issue":"1","key":"key2021081408083158700_ref050","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1057\/jit.2016.4","article-title":"Towards a value theory for personal data","volume":"32","year":"2017","journal-title":"Journal of Information Technology"},{"key":"key2021081408083158700_ref051","first-page":"1","article-title":"Psychology of ownership and asset defense: why people value their personal information beyond privacy","volume-title":"Proceedings of the 33rd International Conference on Information Systems","year":"2012"},{"key":"key2021081408083158700_ref0104","article-title":"Distribution of Instagram users worldwide as of January 2019, by age group","volume-title":"Statistica","author":"Statistica","year":"2019"},{"issue":"1","key":"key2021081408083158700_ref052","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2224\/sbp.2015.43.1.1","article-title":"Self-disclosure on social networking sites","volume":"43","year":"2015","journal-title":"Social Behavior and Personality: An International Journal"},{"key":"key2021081408083158700_ref053","doi-asserted-by":"crossref","first-page":"80","DOI":"10.5220\/0006301000800091","article-title":"Perceptions of digital footprints and the value of privacy","volume-title":"Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security","year":"2017"},{"issue":"5","key":"key2021081408083158700_ref054","doi-asserted-by":"crossref","first-page":"700","DOI":"10.1002\/asi.23894","article-title":"How people protect their privacy on Facebook: a cost\u2010benefit view","volume":"69","year":"2018","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"key2021081408083158700_ref055","first-page":"4152","article-title":"Unpacking the privacy paradox: irrational decision-making within the privacy calculus","volume-title":"Proceedings of the 33rd International Conference on Information Systems","year":"2012"},{"key":"key2021081408083158700_ref056","volume-title":"xxx Students Handbook","author":"xxx University","year":"2015"},{"key":"key2021081408083158700_ref057","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.chb.2014.12.012","article-title":"Privacy antecedents for SNS self-disclosure: the case of Facebook","volume":"45","year":"2015","journal-title":"Computers in Human Behavior"},{"key":"key2021081408083158700_ref058","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.chb.2018.04.041","article-title":"Why do college students prefer Facebook, Twitter, or Instagram? Site affordances, tensions between privacy and self-expression, and implications for social capital","volume":"86","year":"2018","journal-title":"Computers in Human Behavior"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-10-2020-0168\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-10-2020-0168\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:15Z","timestamp":1753406595000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/29\/3\/413-434\/225433"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,21]]},"references-count":64,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,5,21]]},"published-print":{"date-parts":[[2021,8,17]]}},"alternative-id":["10.1108\/ICS-10-2020-0168"],"URL":"https:\/\/doi.org\/10.1108\/ics-10-2020-0168","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2021,5,21]]}}}