{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:18:57Z","timestamp":1754158737458,"version":"3.41.2"},"reference-count":59,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2022,11,7]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this paper is to establish reciprocity among socio-location attributes while underlining the additional users\u2019 privacy implications on social media (SM).<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>Digital identity theories, social software engineering theory and the Privacy Safeguard (PriS) methodology were considered while reviewing 32 papers for identifying users\u2019 SM attributes. After proposing interrelations among socio-location attributes, the PriS method was used to match social aspects of privacy in designing case studies to illustrate the associations through potential users\u2019 privacy implications.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Eighteen users\u2019 SM attributes were collected and correlated to the Face, Frame, Activity, Time and Stage (FFrATS) 4\u2009W (socio-location attributes), which provoke further privacy implications due to the notions of self-determination and self-disclosure on SM. The authors draw on the PriS methodology to address privacy\u2019s multidimensionality while creating case studies to examine privacy issues arising due to socio-location attribute disclosure and users\u2019 trajectories and normativity lines.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>Supplementary case studies and research are needed to enable the design of a socio-spatially and privacy-aware designing methodology.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>Designing proper methodologies and techniques to address users\u2019 privacy implications deriving from socio-location attributes can provide designers with a technical solution to SM platforms.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Social implications<\/jats:title>\n<jats:p>Socio-location attribute disclosure constructs representative SM profiles; however, the revelation of attributes and their interrelations create additional privacy implications for SM users.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>Deepening the understanding of disclosing socio-location attributes on SM while bridging the socio-technical gap will provide the necessary background for proposing technical solutions to protecting users\u2019 privacy.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-12-2021-0211","type":"journal-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T08:05:20Z","timestamp":1652774720000},"page":"705-729","source":"Crossref","is-referenced-by-count":4,"title":["Understanding the role of users\u2019 socio-location attributes and their privacy implications on social media"],"prefix":"10.1108","volume":"30","author":[{"given":"Katerina","family":"Vgena","sequence":"first","affiliation":[]},{"given":"Angeliki","family":"Kitsiou","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Kalloniatis","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2022,5,19]]},"reference":[{"issue":"1","key":"key2022110716293146100_ref001","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1515\/til-2019-0003","article-title":"Re-reading Westin","volume":"20","year":"2019","journal-title":"Theoretical Inquiries in Law"},{"first-page":"199","article-title":"Location-based and preference-aware recommendation using sparse geo-social networking data","year":"2012","key":"key2022110716293146100_ref002"},{"issue":"4","key":"key2022110716293146100_ref003","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1111\/jcom.12106","article-title":"Self-disclosure in social media: extending the functional approach to disclosure motivations and characteristics on social network sites","volume":"64","year":"2014","journal-title":"Journal of Communication"},{"issue":"7","key":"key2022110716293146100_ref004","doi-asserted-by":"crossref","first-page":"2296","DOI":"10.1177\/1461444817714790","article-title":"Context collapse and privacy management: diversity in Facebook friends increases online news reading and sharing","volume":"20","year":"2018","journal-title":"New Media and Society"},{"key":"key2022110716293146100_ref04a","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1080\/13803611.2015.1024009","article-title":"You don\u2019t look like your profile picture\u201d: the ethical implications of researching online identities in higher education","volume":"21","year":"2015","journal-title":"Educational Research and Evaluation"},{"issue":"1","key":"key2022110716293146100_ref005","doi-asserted-by":"crossref","first-page":"205630511876334","DOI":"10.1177\/2056305118763349","article-title":"Time collapse in social media: extending the context collapse","volume":"4","year":"2018","journal-title":"Social Media + Society"},{"first-page":"81","article-title":"Location disclosure to social relations: why, when and what people want to share","year":"2005","key":"key2022110716293146100_ref006"},{"key":"key2022110716293146100_ref07a","doi-asserted-by":"publisher","first-page":"57","DOI":"10.3390\/info11020057","article-title":"Social media and the scourge of visual privacy","volume":"11","year":"2020","journal-title":"Information"},{"key":"key2022110716293146100_ref08a","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.chb.2015.12.050","article-title":"Living in a big data world: Predicting mobile commerce activity through privacy concerns","volume":"58","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"key2022110716293146100_ref09a","doi-asserted-by":"publisher","DOI":"10.1177\/016555151987970","article-title":"Digital identity and the online self: Footprint strategies \u2013 An exploratory and comparative research study","year":"2019","journal-title":"Journal of Information Science"},{"key":"key2022110716293146100_ref010a","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1177\/1461444815605454","article-title":"Bedrooms and beyond: Youth, identity and privacy on social network sites","volume":"19","journal-title":"New Media and Society"},{"key":"key2022110716293146100_ref007","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1002\/9781118321607.ch18","article-title":"Pseudonyms and the rise of the Real-Name web","volume-title":"A Companion to New Media Dynamics","year":"2013"},{"key":"key2022110716293146100_ref07d","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1080\/15252019.2010.10722168","article-title":"Gender differences in privacy-related measures for young adult Facebook Users","volume-title":"Journal of Interactive Advertising","year":"2010"},{"key":"key2022110716293146100_ref08d","unstructured":"Inria (2022), \u201cScientific reviews and challenges in cyber security\u201d, available at: www.inria.fr\/en\/news\/news-from-inria\/inria-publishes-its-white-book-on-cybersecurity"},{"key":"key2022110716293146100_ref012a","first-page":"11","article-title":"An evaluation of students\u2019 identity-sharing behaviour in Social Network communities preparation for knowledge sharing","volume":"1","year":"2010","journal-title":"International Journal for The Advancement of Science and Arts"},{"volume-title":"Social Identity","year":"2008","key":"key2022110716293146100_ref008"},{"article-title":"Self-disclosure","volume-title":"Privacy and the Internet","year":"2012","key":"key2022110716293146100_ref009"},{"issue":"3","key":"key2022110716293146100_ref010","article-title":"Increasing internet users trust in the cloud computing era: the role of privacy","volume":"6","year":"2016","journal-title":"Journal of Mass Communication and Journalism"},{"issue":"5","key":"key2022110716293146100_ref011","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1108\/ICS-06-2016-0044","article-title":"Incorporating privacy in the design of cloud-based systems: a conceptual meta-model","volume":"25","year":"2017","journal-title":"Information and Computer Security"},{"issue":"3","key":"key2022110716293146100_ref012","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s00766-008-0067-3","article-title":"Addressing privacy requirements in system design: the PriS method","volume":"13","year":"2008","journal-title":"Requirements Engineering"},{"issue":"3","key":"key2022110716293146100_ref013","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1177\/0539018408092575","article-title":"Identity, social status, privacy and face-keeping in digital society","volume":"47","year":"2008","journal-title":"Social Science Information"},{"year":"2008","key":"key2022110716293146100_ref019a","article-title":"Understanding social networking on young people s construction and co construction of identity online"},{"key":"key2022110716293146100_ref014","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.jss.2015.04.084","article-title":"Behavioral software engineering: a definition and systematic literature review","volume":"107","year":"2015","journal-title":"Journal of Systems and Software"},{"key":"key2022110716293146100_ref015","doi-asserted-by":"crossref","first-page":"17606","DOI":"10.1109\/ACCESS.2018.2822260","article-title":"Location privacy and its applications: a systematic study","volume":"6","year":"2018","journal-title":"IEEE Access"},{"first-page":"151","article-title":"Security and privacy requirements analysis within a social setting","year":"2003","key":"key2022110716293146100_ref016"},{"key":"key2022110716293146100_ref023a","article-title":"Where dating meets data: investigating social and institutional privacy concerns on tinder","volume":"12","year":"2017","journal-title":"Social Media Society"},{"issue":"2","key":"key2022110716293146100_ref017","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1111\/1540-4560.00071","article-title":"On the status and contribution of Westin\u2019s and Altman\u2019s theories of privacy","volume":"59","year":"2003","journal-title":"Journal of Social Issues"},{"article-title":"The public domain: surveillance in everyday life","year":"2012","key":"key2022110716293146100_ref025a","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v9i4.4342"},{"issue":"1","key":"key2022110716293146100_ref018","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1177\/1461444810365313","article-title":"I tweet honestly, I tweet passionately: Twitter users, context collapse and the imagined audience","volume":"13","year":"2011","journal-title":"New Media and Society"},{"key":"key2022110716293146100_ref027a","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1002\/9781118321607.ch23","article-title":"Online identity","volume-title":"A companion to new media dynamics","year":"2013"},{"issue":"7","key":"key2022110716293146100_ref019","doi-asserted-by":"crossref","first-page":"1051","DOI":"10.1177\/1461444814543995","article-title":"Networked privacy: how teenagers negotiate context in social media","volume":"16","year":"2014","journal-title":"New Media and Society"},{"issue":"4","key":"key2022110716293146100_ref020","first-page":"541","article-title":"Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies","volume":"20","year":"2010","journal-title":"The VLDB Journal"},{"issue":"3","key":"key2022110716293146100_ref021","doi-asserted-by":"crossref","first-page":"67","DOI":"10.3390\/fi11030067","article-title":"Gamification vs. privacy: identifying and analysing the major concerns","volume":"11","year":"2019","journal-title":"Future Internet"},{"first-page":"306","article-title":"The transformation of identity and privacy through online social networks (the CouchSurfing case)","year":"2011","key":"key2022110716293146100_ref022"},{"issue":"2","key":"key2022110716293146100_ref023","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1080\/13576500342000103","article-title":"The social and personal identities scale: a measure of the differential importance ascribed to social and personal self-categorizations","volume":"3","year":"2004","journal-title":"Self and Identity"},{"volume-title":"A networked self: identity, community, and culture on Social Network sites","year":"2010","key":"key2022110716293146100_ref033a"},{"year":"2020","key":"key2022110716293146100_ref034a","article-title":"Shaping digital identities in social networks: data elements and the role of privacy concerns"},{"key":"key2022110716293146100_ref035a","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.appdev.2008.12.010","article-title":"College students\u2019 social networking experiences on Facebook","volume":"30","year":"2009","journal-title":"Journal of Applied Developmental Psychology"},{"issue":"1","key":"key2022110716293146100_ref024","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/TMC.2012.247","article-title":"Preserving location privacy in geosocial applications","volume":"13","year":"2014","journal-title":"IEEE Transactions on Mobile Computing"},{"year":"2004","key":"key2022110716293146100_ref025","article-title":"Privacy, freedom and dignity"},{"issue":"3","key":"key2022110716293146100_ref026","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MIC.2011.29","article-title":"Location-related privacy in geo-social networks","volume":"15","year":"2011","journal-title":"IEEE Internet Computing"},{"journal-title":"Cyberpsychology: Journal of Psychosocial Research on Cyberspace","article-title":"The construction of the virtual self on myspace","year":"2010","key":"key2022110716293146100_ref039a"},{"issue":"10","key":"key2022110716293146100_ref027","doi-asserted-by":"crossref","first-page":"1643","DOI":"10.1177\/1461444814531364","article-title":"The spatial self: location-based identity performance on social media","volume":"17","year":"2015","journal-title":"New Media and Society"},{"key":"key2022110716293146100_ref041a","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sbspro.2012.11.102","article-title":"Constructing Identity through Facebook Profiles: online identity and visual impression management of university students in Malaysia","volume":"65","year":"2012","journal-title":"Procedia - Social and Behavioral Sciences"},{"first-page":"48","article-title":"Concepts for personal location privacy policies","year":"2001","key":"key2022110716293146100_ref028"},{"first-page":"359","article-title":"The impact of social media on software engineering practices and tools","year":"2010","key":"key2022110716293146100_ref029"},{"year":"2006","key":"key2022110716293146100_ref044a","article-title":"An evaluation of identity-sharing behavior in social network communities"},{"issue":"2","key":"key2022110716293146100_ref030","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1111\/jcc4.12052","article-title":"The \u2018privacy paradox\u2019 in the social web: the impact of privacy concerns, individual characteristics and the perceived social relevance on different forms of self-disclosure","volume":"19","year":"2014","journal-title":"Journal of Computer-Mediated Communication"},{"volume-title":"Privacy Online","year":"2011","key":"key2022110716293146100_ref031"},{"key":"key2022110716293146100_ref047a","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1177\/1461444816660731","article-title":"Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users","volume":"20","year":"2018","journal-title":"New Media and Society"},{"key":"key2022110716293146100_ref032","first-page":"3","article-title":"Do identity and location data interrelate? New affiliations and privacy concerns in Social-Driven sharing","volume-title":"Anderst-Kotsis G, Tjoa AM and Khalil I): Trust, Privacy and Security in Digital Business","year":"2019"},{"issue":"11","key":"key2022110716293146100_ref033","doi-asserted-by":"crossref","first-page":"234","DOI":"10.3390\/fi11110234","article-title":"Toward addressing location privacy issues: new affiliations with social and location attributes","volume":"11","year":"2019","journal-title":"Future Internet"},{"article-title":"Disclosing social and location attributes on social media: the impact on users\u2019 privacy","volume-title":"SECPRE 2021 5th International Workshop on Security and Privacy Requirements Engineering in Conjunction with 26th European Symposium on Research in Computer Security (ESORICS)","year":"2021","key":"key2022110716293146100_ref034"},{"key":"key2022110716293146100_ref051a","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-030-95484-0_9","article-title":"Disclosing Social and Location Attributes on Social Media: The Impact on Users\u2019 Privacy","volume-title":"Computer Security. ESORICS 2021 International Workshops, Lecture Notes in Computer Science","year":"2022"},{"key":"key2022110716293146100_ref052a","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1504\/IJMC.2016.073358","article-title":"Examining social influence factors affecting consumer continuous usage intention for mobile social networking applications","volume":"14","year":"2016","journal-title":"International Journal of Mobile Communications"},{"issue":"2","key":"key2022110716293146100_ref035","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1111\/1540-4560.00072","article-title":"Social and political dimensions of privacy","volume":"59","year":"2003","journal-title":"Journal of Social Issues"},{"key":"key2022110716293146100_ref054a","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1177\/1461444812450679","article-title":"Identification and the practices of identity and privacy in everyday digital communication","volume":"14","year":"2012","journal-title":"New Media and Society"},{"key":"key2022110716293146100_ref055a","doi-asserted-by":"publisher","first-page":"1816","DOI":"10.1016\/j.chb.2008.02.012","article-title":"Identity construction on Facebook: Digital empowerment in anchored relationships","volume":"24","year":"2008","journal-title":"Computers in Human Behavior"},{"key":"key2022110716293146100_ref036","unstructured":"Marwick, A. (2022), \u201cThe public domain: surveillance in everyday life\u201d, available at: www.researchgate.net\/publication\/279673507_The_Public_Domain_Surveillance_in_Everyday_Life"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-12-2021-0211\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-12-2021-0211\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:28Z","timestamp":1753406608000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/30\/5\/705-729\/103747"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,19]]},"references-count":59,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2022,5,19]]},"published-print":{"date-parts":[[2022,11,7]]}},"alternative-id":["10.1108\/ICS-12-2021-0211"],"URL":"https:\/\/doi.org\/10.1108\/ics-12-2021-0211","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"},{"type":"electronic","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2022,5,19]]}}}