{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T02:36:05Z","timestamp":1774578965012,"version":"3.50.1"},"reference-count":153,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IMDS"],"published-print":{"date-parts":[[2024,1,30]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>This paper explores the similarities and differences in privacy attitudes, trust and risk beliefs between younger and older adults on social networking sites. The objective of the article is to ascertain whether any notable differences exist between younger (18\u201325\u00a0years old) and older (55+ years old) adults in how trust and risk are influenced by privacy concerns upon personal information disclosure on social media.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>A Likert scale instrument validated in previous research was employed to gather the responses of 148 younger and 152 older adults. The scale was distributed through Amazon Mechanical Turk. Data were analyzed through partial least squares structural equation modeling.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>No significant differences were found between younger and older adults in how social media privacy concerns related to trust and risk beliefs. Two privacy concern dimensions were found to have a significant influence on perceptions of risk for both populations: collection and control. Predictability and a sense of control are proposed as two conceptual approaches that can explain these findings.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This article is the first one to explore age differences in privacy concerns, trust and risk on social media employing conceptual developments and an instrument specifically tailored to the social media environment. Based on the findings, several strategies are suggested to keep privacy concerns on social media at a minimum, reduce risk perceptions and increase users' trust.<\/jats:p><\/jats:sec>","DOI":"10.1108\/imds-07-2023-0462","type":"journal-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T21:51:08Z","timestamp":1701381068000},"page":"640-665","source":"Crossref","is-referenced-by-count":18,"title":["Linked by age: a study on social media privacy concerns among younger and older adults"],"prefix":"10.1108","volume":"124","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9870-7458","authenticated-orcid":false,"given":"David","family":"Goyeneche","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5386-3905","authenticated-orcid":false,"given":"Stephen","family":"Singaraju","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1581-8732","authenticated-orcid":false,"given":"Luis","family":"Arango","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2023,12,4]]},"reference":[{"key":"key2024012915083417300_ref001","article-title":"Older and younger adults are influenced differently by dark pattern designs","year":"2023"},{"issue":"5","key":"key2024012915083417300_ref002","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1037\/0003-066X.55.5.469","article-title":"Emerging adulthood: a theory of development from the late teens through the twenties","volume":"55","year":"2000","journal-title":"The American Psychologist"},{"issue":"1","key":"key2024012915083417300_ref003","doi-asserted-by":"crossref","first-page":"35","DOI":"10.61100\/tacit.v1i1.37","article-title":"The role of social media in shaping public opinion and its influence on economic decisions","volume":"1","year":"2023","journal-title":"Technology and Society Perspectives (TACIT)"},{"key":"key2024012915083417300_ref004","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.ijinfomgt.2019.05.014","article-title":"Effect of penitence on social media trust and privacy concerns: the case of Facebook","volume":"50","year":"2020","journal-title":"International Journal of Information Management"},{"issue":"3","key":"key2024012915083417300_ref005","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1177\/0956797609360756","article-title":"Facebook profiles reflect actual personality, not self-idealization","volume":"21","year":"2010","journal-title":"Psychological Science"},{"issue":"1","key":"key2024012915083417300_ref006","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/BF02723327","article-title":"On the evaluation of structural equation models","volume":"16","year":"1988","journal-title":"Journal of the Academy of Marketing Science"},{"key":"key2024012915083417300_ref007","article-title":"Mobile application security: role of perceived privacy as the predictor of security perceptions","volume":"52","year":"2020","journal-title":"International Journal of Information Management"},{"issue":"3","key":"key2024012915083417300_ref008","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2022.103618","article-title":"Internet privacy concerns revisited: oversight from surveillance and right to be forgotten as new dimensions","volume":"59","year":"2022","journal-title":"Information and Management"},{"issue":"9","key":"key2024012915083417300_ref009","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394","article-title":"A privacy paradox: social networking in the United States","volume":"11","year":"2006","journal-title":"First Monday"},{"issue":"7","key":"key2024012915083417300_ref010","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.tele.2017.04.013","article-title":"The privacy paradox \u2013 investigating discrepancies between expressed privacy concerns and actual online behavior \u2013 a systematic literature review","volume":"34","year":"2017","journal-title":"Telematics and Informatics"},{"key":"key2024012915083417300_ref011","article-title":"Systematic review of survey scales measuring information privacy concerns on social network sites","volume":"85","year":"2023","journal-title":"Telematics and Informatics"},{"issue":"4","key":"key2024012915083417300_ref012","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.2307\/41409971","article-title":"Privacy in the digital age: a review of information privacy research in information systems","volume":"35","year":"2011","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2024012915083417300_ref013","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1177\/0165551516653590","article-title":"An empirical test of an antecedents \u2013 privacy concerns \u2013 outcomes model","volume":"43","year":"2017","journal-title":"Journal of Information Science"},{"key":"key2024012915083417300_ref014","volume-title":"Internet Privacy Rights","year":"2014"},{"key":"key2024012915083417300_ref015","volume-title":"What's Mine Is Yours : The Rise of Collaborative Consumption","year":"2010","edition":"1st ed."},{"issue":"2","key":"key2024012915083417300_ref016","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1002\/asi.20459","article-title":"Development of measures of online privacy concern and protection for use on the Internet","volume":"58","year":"2007","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"12","key":"key2024012915083417300_ref017","doi-asserted-by":"crossref","first-page":"2705","DOI":"10.1177\/14614448211000327","article-title":"Everybody wants some: collection and control of personal information, privacy concerns, and social media use","volume":"24","year":"2022","journal-title":"New Media and Society"},{"issue":"5","key":"key2024012915083417300_ref018","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1108\/14684520710832315","article-title":"The role of security, privacy, usability and reputation in the development of online banking","volume":"31","year":"2007","journal-title":"Online Information Review"},{"key":"key2024012915083417300_ref019","unstructured":"Chaffey, D. (2023), \u201cGlobal social media statistics research summary 2023\u201d, available at: https:\/\/www.smartinsights.com\/social-media-marketing\/social-media-strategy\/new-global-social-media-research\/ (accessed 12 April)."},{"issue":"4","key":"key2024012915083417300_ref020","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1016\/j.dss.2013.01.004","article-title":"Privacy preserving actions of older adults on social media: exploring the behavior of opting out of information sharing","volume":"55","year":"2013","journal-title":"Decision Support Systems"},{"key":"key2024012915083417300_ref156","doi-asserted-by":"crossref","first-page":"106718","DOI":"10.1016\/j.chb.2021.106718","article-title":"Privacy concerns can explain unwillingness to download and use contact tracing apps when COVID-19 concerns are high","volume":"119","year":"2021","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2024012915083417300_ref021","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1080\/08874417.2004.11647599","article-title":"Protecting personal information online: a survey of user privacy concerns and control techniques","volume":"44","year":"2004","journal-title":"Journal of Computer Information Systems"},{"issue":"4","key":"key2024012915083417300_ref022","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1108\/14684520910985710","article-title":"Determinants of customer repurchase intention in online shopping","volume":"33","year":"2009","journal-title":"Online Information Review"},{"issue":"3","key":"key2024012915083417300_ref023","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1089\/cpb.2008.0226","article-title":"Information disclosure and control on Facebook: are they two sides of the same coin or two different processes?","volume":"12","year":"2009","journal-title":"Cyberpsychology and Behavior"},{"key":"key2024012915083417300_ref024","first-page":"793","article-title":"Privacy harms","volume":"102","year":"2022","journal-title":"BUL Review"},{"key":"key2024012915083417300_ref025","article-title":"The personalization\u2013privacy paradox in the attention economy","volume":"161","year":"2020","journal-title":"Technological Forecasting and Social Change"},{"issue":"1","key":"key2024012915083417300_ref026","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1177\/1103308818755516","article-title":"Social media and its role in friendship-driven interactions among young people: a mixed methods study","volume":"27","year":"2019","journal-title":"Young"},{"issue":"1","key":"key2024012915083417300_ref027","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","article-title":"Facebook and online privacy: attitudes, behaviors, and unintended consequences","volume":"15","year":"2009","journal-title":"Journal of Computer\u2010Mediated Communication"},{"key":"key2024012915083417300_ref028","unstructured":"DeCew, J. (2018), \u201cPrivacy\u201d, in Zalta, E. (Ed.), Stanford Encyclopedia of Philosophy: Metaphysics Reearch Lab, Stanford University."},{"issue":"1","key":"key2024012915083417300_ref029","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for E-commerce transactions","volume":"17","year":"2006","journal-title":"Information Systems Research"},{"key":"key2024012915083417300_ref031","unstructured":"Dixon, S. (2023), \u201cDaily time spent on social networking by internet users worldwide from 2012 to 2022\u201d, available at: https:\/\/www.statista.com\/statistics\/433871\/daily-social-media-usage-worldwide\/ (accessed 12 April)."},{"issue":"2","key":"key2024012915083417300_ref032","doi-asserted-by":"publisher","first-page":"66","DOI":"10.4018\/jgim.2005040104","article-title":"Perceived risk, the internet shopping experience and online purchasing behavior: a New Zealand perspective","volume":"13","year":"2005","journal-title":"Journal of Global Information Management (JGIM)"},{"issue":"8","key":"key2024012915083417300_ref033","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1016\/j.jbusres.2006.02.006","article-title":"Understanding online B-to-C relationships: an\u00a0integrated model of privacy concerns, trust, and commitment","volume":"59","year":"2006","journal-title":"Journal of Business Research"},{"issue":"1","key":"key2024012915083417300_ref034","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1038\/s44159-021-00006-y","article-title":"The psychological drivers of misinformation belief and its resistance to correction","volume":"1","year":"2022","journal-title":"Nature Reviews Psychology"},{"issue":"10","key":"key2024012915083417300_ref035","doi-asserted-by":"publisher","first-page":"1372","DOI":"10.1177\/0002764218787026","article-title":"Privacy attitudes and concerns in the digital lives of older adults: Westin's privacy attitude typology revisited","volume":"62","year":"2018","journal-title":"The American Behavioral Scientist (Beverly Hills)"},{"key":"key2024012915083417300_ref036","volume-title":"Identity: Youth and Crisis","year":"1968"},{"key":"key2024012915083417300_ref037","volume-title":"Identity and the Life Cycle","year":"1980"},{"key":"key2024012915083417300_ref038","volume-title":"US Social Network Usage by Generation","year":"2023"},{"issue":"1","key":"key2024012915083417300_ref039","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2307\/3151312","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"key":"key2024012915083417300_ref040","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/19312458.2023.2246014","article-title":"Development and validation of the need for privacy scale (NFP-S)","year":"2023","journal-title":"Communication Methods and Measures"},{"key":"key2024012915083417300_ref041","first-page":"21","article-title":"Privacy and security threat models and mitigation strategies of older adults","year":"2019"},{"issue":"7","key":"key2024012915083417300_ref042","doi-asserted-by":"publisher","first-page":"820","DOI":"10.1002\/job.2275","article-title":"Changing the focus of locus (of control): a targeted review of the locus of control literature and agenda for future research","volume":"39","year":"2018","journal-title":"Journal of Organizational Behavior"},{"issue":"3","key":"key2024012915083417300_ref043","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s10796-015-9611-0","article-title":"Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation","volume":"19","year":"2017","journal-title":"A Journal of Research and Innovation"},{"key":"key2024012915083417300_ref044","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.chb.2015.07.014","article-title":"Understanding consumers' continuance intention towards mobile purchase: a theoretical framework and empirical study \u2013 a case of China","volume":"53","year":"2015","journal-title":"Computers in Human Behavior"},{"key":"key2024012915083417300_ref045","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.cose.2018.04.002","article-title":"Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior","volume":"77","year":"2018","journal-title":"Computers and Security"},{"issue":"1","key":"key2024012915083417300_ref046","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s10606-021-09422-3","article-title":"Regional differences in information privacy concerns after the facebook-Cambridge Analytica data scandal","volume":"31","year":"2022","journal-title":"Computer Supported Cooperative Work (CSCW)"},{"key":"key2024012915083417300_ref047","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","year":"2016"},{"issue":"3","key":"key2024012915083417300_ref048","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1108\/IMDS-04-2016-0130","article-title":"An updated and expanded assessment of PLS-SEM in information systems research","volume":"117","year":"2017","journal-title":"Industrial Management and Data Systems"},{"issue":"1","key":"key2024012915083417300_ref049","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1108\/ebr-11-2018-0203","article-title":"When to use and how to report the results of PLS-SEM","volume":"31","year":"2019","journal-title":"European Business Review"},{"key":"key2024012915083417300_ref050","first-page":"3737","article-title":"\u2018What can I really do?\u2019 Explaining the privacy paradox with online apathy","volume":"10","year":"2016","journal-title":"International Journal of Communication"},{"issue":"1","key":"key2024012915083417300_ref051","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1186\/s40537-019-0206-3","article-title":"Uncertainty in big data analytics: survey, opportunities, and challenges","volume":"6","year":"2019","journal-title":"Journal of Big Data"},{"issue":"1","key":"key2024012915083417300_ref052","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","article-title":"A new criterion for assessing discriminant validity in variance-based structural equation modeling","volume":"43","year":"2015","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"1","key":"key2024012915083417300_ref053","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/jcp2010001","article-title":"Cybersecurity practices for social media users: a\u00a0systematic literature review","volume":"2","year":"2022","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"key2024012915083417300_ref054","volume-title":"Defining Young Adulthood","year":"2019"},{"issue":"3","key":"key2024012915083417300_ref055","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1177\/1745691618803647","article-title":"The dark side of information proliferation","volume":"14","year":"2019","journal-title":"Perspectives on Psychological Science"},{"issue":"4","key":"key2024012915083417300_ref056","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/299157.299175","article-title":"Building consumer trust online","volume":"42","year":"1999","journal-title":"Communications of the ACM"},{"issue":"3","key":"key2024012915083417300_ref057","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1080\/07421222.2014.995538","article-title":"Digital natives or digital immigrants? The impact of user characteristics on online trust","volume":"31","year":"2014","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"key2024012915083417300_ref058","doi-asserted-by":"publisher","first-page":"275","DOI":"10.25300\/MISQ\/2013\/37.1.12","article-title":"Internet privacy concerns: an integrated conceptualization and four empirical studies","volume":"37","year":"2013","journal-title":"MIS Quarterly"},{"key":"key2024012915083417300_ref059","article-title":"How different are young adults when it comes to information privacy attitudes and policies","year":"2010","journal-title":"SSRN Electronic Journal"},{"key":"key2024012915083417300_ref060","doi-asserted-by":"crossref","unstructured":"Hughes, K. (2015), \u201cThe social value of privacy, the value of privacy to society and human rights discourse\u201d, in Roessler, B. and Mokrosinska, D. (Eds), Social Dimensions of Privacy. Interdisciplinary Perspectives, Cambridge University Press.","DOI":"10.1017\/CBO9781107280557.013"},{"issue":"2","key":"key2024012915083417300_ref061","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1002\/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7","article-title":"Use of partial least squares (PLS) in strategic management research: a review of four recent studies","volume":"20","year":"1999","journal-title":"Strategic Management Journal"},{"issue":"2","key":"key2024012915083417300_ref062","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1386\/macp.4.2.245_3","article-title":"The new risk communities: social networking sites and risk","volume":"4","year":"2008","journal-title":"International Journal of Media and Cultural Politics"},{"key":"key2024012915083417300_ref063","first-page":"611","article-title":"Turkopticon: interrupting worker invisibility in amazon mechanical turk","year":"2013"},{"issue":"8","key":"key2024012915083417300_ref064","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MC.2018.3191268","article-title":"User data privacy: Facebook, Cambridge Analytica, and privacy protection","volume":"51","year":"2018","journal-title":"Computer"},{"key":"key2024012915083417300_ref065","first-page":"34","article-title":"Privacy concerns in chatbot interactions","year":"2020"},{"issue":"1-2","key":"key2024012915083417300_ref066","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/A:1019104520776","article-title":"Consumer trust in an Internet store","volume":"1","year":"2000","journal-title":"Information Technology and Management"},{"key":"key2024012915083417300_ref067","article-title":"Privacy concerns and benefits of engagement with social media-enabled apps: a privacy calculus perspective","volume":"107","year":"2020","journal-title":"Computers in Human Behavior"},{"key":"key2024012915083417300_ref068","doi-asserted-by":"crossref","unstructured":"Kahlow, J.A. (2020), \u201cThe influence of technology on privacy boundary management in young adults' sexting relationships: a communication privacy management perspective\u201d, in Young Adult Sexuality in the Digital Age, IGI Global, pp.\u00a073-93.","DOI":"10.4018\/978-1-7998-3187-7.ch005"},{"issue":"1","key":"key2024012915083417300_ref069","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1287\/isre.13.1.36.97","article-title":"An empirical examination of the concern for information privacy instrument","volume":"13","year":"2002","journal-title":"Information Systems Research"},{"issue":"17-18","key":"key2024012915083417300_ref070","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1080\/0267257X.2017.1400994","article-title":"Privacy concerns on social networking sites: a longitudinal study","volume":"33","year":"2017","journal-title":"Journal of Marketing Management"},{"issue":"1","key":"key2024012915083417300_ref071","article-title":"Age differences in privacy attitudes, literacy and privacy management on Facebook","volume":"10","year":"2016","journal-title":"Cyberpsychology: Journal of Psychosocial Research on Cyberspace"},{"issue":"4","key":"key2024012915083417300_ref072","doi-asserted-by":"crossref","first-page":"274","DOI":"10.14329\/apjis.2018.28.4.274","article-title":"Individual differences in online privacy concern","volume":"28","year":"2018","journal-title":"Asia Pacific Journal of Information Systems"},{"issue":"5","key":"key2024012915083417300_ref073","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1002\/cpp.2066","article-title":"A proposed model of psychodynamic psychotherapy linked to Erik Erikson's eight stages of psychosocial development","volume":"24","year":"2017","journal-title":"Clinical Psychology and Psychotherapy"},{"issue":"4","key":"key2024012915083417300_ref074","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/ijec.2015100101","article-title":"Common method bias in PLS-SEM: a full collinearity assessment approach","volume":"11","year":"2015","journal-title":"International Journal of E-Collaboration (Ijec)"},{"key":"key2024012915083417300_ref075","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","article-title":"Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon","volume":"64","year":"2017","journal-title":"Computers and Security"},{"key":"key2024012915083417300_ref076","first-page":"30","article-title":"Is older, wiser? An age-specific study of exposure of private information","year":"2012"},{"issue":"1","key":"key2024012915083417300_ref077","doi-asserted-by":"crossref","first-page":"14","DOI":"10.36965\/OJAKM.2017.5(1)14-26","article-title":"Social media sites privacy concerns: empirical validation of an instrument","volume":"5","year":"2017","journal-title":"Online Journal of Applied Knowledge Management"},{"issue":"6","key":"key2024012915083417300_ref078","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1108\/IMDS-12-2017-0558","article-title":"Social media privacy concerns: trusting beliefs and risk beliefs","volume":"118","year":"2018","journal-title":"Industrial Management and Data Systems"},{"issue":"2","key":"key2024012915083417300_ref079","first-page":"133","article-title":"Social media privacy concerns, security concerns, trust, and awareness: empirical validation of an instrument","volume":"22","year":"2021","journal-title":"Issues in Information Systems"},{"issue":"3","key":"key2024012915083417300_ref080","article-title":"Social media privacy and security concerns: trust and awareness","volume":"23","year":"2022","journal-title":"Issues in Information Systems"},{"issue":"3","key":"key2024012915083417300_ref157","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1080\/0960085X.2020.1770632","article-title":"What drives unverified information sharing and cyberchondria during the COVID-19 pandemic?","volume":"29","year":"2020","journal-title":"European Journal of Information Systems"},{"key":"key2024012915083417300_ref081","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.chb.2019.09.017","article-title":"Self-presentation on Instagram and friendship development among young adults: a moderated mediation model of media richness, perceived functionality, and openness","volume":"103","year":"2020","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"key2024012915083417300_ref082","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.giq.2019.01.002","article-title":"Information privacy concerns and demographic characteristics: data from a Korean media panel survey","volume":"36","year":"2019","journal-title":"Government Information Quarterly"},{"key":"key2024012915083417300_ref083","volume-title":"Research with the Locus of Control Construct","year":"2013"},{"issue":"1","key":"key2024012915083417300_ref084","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1108\/JBIM-12-2018-0381","article-title":"Impact of risk perception on customer purchase behavior: a meta-analysis","volume":"35","year":"2020","journal-title":"Journal of Business and Industrial Marketing"},{"issue":"5","key":"key2024012915083417300_ref085","doi-asserted-by":"crossref","first-page":"1440","DOI":"10.1108\/IMDS-05-2022-0293","article-title":"Coping with COVID-19 using contact tracing mobile apps","volume":"123","year":"2023","journal-title":"Industrial Management and Data Systems"},{"issue":"3","key":"key2024012915083417300_ref086","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1108\/ITP-10-2017-0339","article-title":"How digital natives make their self-disclosure decisions: a cross-cultural comparison","volume":"32","year":"2019","journal-title":"Information Technology and People"},{"key":"key2024012915083417300_ref087","article-title":"Privacy concern, locus of control, and salience in a trust-risk model of information disclosure on social networking sites","year":"2010"},{"issue":"4","key":"key2024012915083417300_ref088","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model","volume":"15","year":"2004","journal-title":"Information Systems Research"},{"key":"key2024012915083417300_ref089","doi-asserted-by":"crossref","unstructured":"Marx, G. (2015), \u201cComing to terms: the kaleidoscope of privacy and surveillance\u201d, in Roessler, B. and Mokrosinska, D. (Eds), Social Dimensions of Privacy. Interdisciplinary Perspectives, Cambridge University Press.","DOI":"10.1017\/CBO9781107280557.003"},{"issue":"2","key":"key2024012915083417300_ref090","first-page":"3","article-title":"The evolution of online privacy: 2000-2003.(LEGAL issues)","volume":"6","year":"2003","journal-title":"Journal of Legal, Ethical and Regulatory Issues"},{"key":"key2024012915083417300_ref091","doi-asserted-by":"crossref","unstructured":"Meisner, B.A. (2022), \u201cAre you OK, Boomer? Intensification of ageism and intergenerational tensions on social media amid COVID-19\u201d, Leisure in the Time of Coronavirus, Routledge, pp.\u00a083-88.","DOI":"10.4324\/9781003145301-12"},{"issue":"2","key":"key2024012915083417300_ref092","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1111\/j.1468-0149.1986.tb01169.x","article-title":"Philosophical dimensions of privacy: an anthology","volume":"27","year":"1986","journal-title":"Philosophical Books"},{"issue":"4","key":"key2024012915083417300_ref093","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2004.tb00292.x","article-title":"Privacy, trust, and disclosure: exploring barriers to electronic commerce","volume":"9","year":"2004","journal-title":"Journal of Computer\u2010Mediated Communication"},{"issue":"7","key":"key2024012915083417300_ref094","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v8i7.1066","article-title":"The \u2018grey digital divide\u2019: perception, exclusion and barriers of access to the Internet for older people","volume":"8","year":"2003","journal-title":"First Monday"},{"issue":"3","key":"key2024012915083417300_ref095","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1002\/dir.20009","article-title":"Strategies for reducing online privacy risks: why consumers read (or don't read) online privacy notices","volume":"18","year":"2004","journal-title":"Journal of Interactive Marketing"},{"issue":"1","key":"key2024012915083417300_ref096","doi-asserted-by":"crossref","first-page":"31","DOI":"10.2307\/2787141","article-title":"Age and the sense of control","volume":"58","year":"1995","journal-title":"Social Psychology Quarterly"},{"key":"key2024012915083417300_ref097","article-title":"Tracing 20 years of research on problematic use of the internet and social media: theoretical models, assessment tools, and an agenda for future work","volume":"112","year":"2022","journal-title":"Comprehensive Psychiatry"},{"key":"key2024012915083417300_ref098","article-title":"Trusting and adopting e-government services in developing countries? Privacy concerns and practices in Rwanda","year":"2017"},{"issue":"1","key":"key2024012915083417300_ref099","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2019.101413","article-title":"Information privacy in e-service: effect of organizational privacy assurances on individual privacy concerns, perceptions, trust and self-disclosure behavior","volume":"37","year":"2020","journal-title":"Government Information Quarterly"},{"issue":"1","key":"key2024012915083417300_ref100","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","article-title":"The privacy paradox: personal information disclosure intentions versus behaviors","volume":"41","year":"2007","journal-title":"Journal of Consumer Affairs"},{"issue":"1","key":"key2024012915083417300_ref101","doi-asserted-by":"publisher","DOI":"10.1177\/2631787720982618","article-title":"Corporations, politics, and democracy: corporate political activities as political corruption","volume":"2","year":"2021","journal-title":"Organization Theory"},{"issue":"1","key":"key2024012915083417300_ref102","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1080\/1369118X.2018.1486870","article-title":"The biggest lie on the internet: ignoring the privacy policies and terms of service policies of social networking services","volume":"23","year":"2020","journal-title":"Information, Communication and Society"},{"issue":"1","key":"key2024012915083417300_ref103","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1002\/hfm.20750","article-title":"M\u2010payment service: interplay of perceived risk, benefit, and trust in service adoption","volume":"29","year":"2019","journal-title":"Human Factors and Ergonomics in Manufacturing and Service Industries"},{"issue":"10","key":"key2024012915083417300_ref104","doi-asserted-by":"crossref","first-page":"718","DOI":"10.1177\/1357633X221122112","article-title":"Exploring public opinion about telehealth during COVID-19 by social media analytics","volume":"28","year":"2022","journal-title":"Journal of Telemedicine and Telecare"},{"key":"key2024012915083417300_ref105","volume-title":"The Economics of Justice","year":"1983"},{"issue":"1","key":"key2024012915083417300_ref106","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1080\/0144929X.2017.1389988","article-title":"Saving face on Facebook: privacy concerns, social benefits, and impression management","volume":"37","year":"2018","journal-title":"Behaviour and Information Technology"},{"issue":"9","key":"key2024012915083417300_ref107","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1002\/asi.24364","article-title":"Online privacy concerns and privacy protection strategies among older adults in East York, Canada","volume":"71","year":"2020","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"2","key":"key2024012915083417300_ref108","first-page":"27","article-title":"Warn them\u2019 or \u2018just lock them\u2019?: investigating privacy concerns among older and working age adults\u201d, UMBC Student Collection, Proceedings on Privacy Enhancing Technologies","year":"2021"},{"key":"key2024012915083417300_ref109","doi-asserted-by":"crossref","unstructured":"R\u00f8nn, K.V. and S\u00f8e, S.O. (2020), \u201cIs social media intelligence private? Privacy in public and the nature of social media intelligence\u201d, Intelligence on the Frontier between State and Civil Society, Routledge, pp.\u00a052-68.","DOI":"10.1201\/9781003009771-5"},{"issue":"6","key":"key2024012915083417300_ref110","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1093\/geronb\/gbt081","article-title":"Risk-taking differences across the adult life span: a question of age and domain","volume":"69","year":"2014","journal-title":"Journals of Gerontology Series B: Psychological Sciences and Social Sciences"},{"issue":"1","key":"key2024012915083417300_ref111","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1037\/h0092976","article-title":"Generalized expectancies for internal versus external control of reinforcement","volume":"80","year":"1966","journal-title":"Psychological Monographs"},{"key":"key2024012915083417300_ref112","article-title":"Contact tracing apps and values dilemmas: a privacy paradox in a neo-liberal world","volume":"55","year":"2020","journal-title":"International Journal of Information Management"},{"issue":"1","key":"key2024012915083417300_ref113","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0017383500026036","article-title":"Polis and Oikos in classical athens 1","volume":"46","year":"1999","journal-title":"Greece and Rome"},{"issue":"3","key":"key2024012915083417300_ref114","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1111\/j.1460-2466.1984.tb02174.x","article-title":"Ritualized and instrumental television viewing","volume":"34","year":"1984","journal-title":"Journal of Communication"},{"issue":"5","key":"key2024012915083417300_ref115","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1108\/14684520710832324","article-title":"A conceptual model of trust in the online environment","volume":"31","year":"2007","journal-title":"Online Information Review"},{"key":"key2024012915083417300_ref116","first-page":"95","article-title":"Managing the ambient trust commons: the economics of online consumer information privacy","volume":"22","year":"2019","journal-title":"Stanford Technology Law Review"},{"issue":"2","key":"key2024012915083417300_ref117","article-title":"Selectivity in posting on social networks: the role of privacy concerns, social capital, and technical literacy","volume":"6","year":"2020","journal-title":"Heliyon"},{"issue":"7","key":"key2024012915083417300_ref118","doi-asserted-by":"publisher","first-page":"2012","DOI":"10.1177\/1461444820925041","article-title":"Vulnerable populations and misinformation: a mixed-methods approach to underserved older adults' online information assessment","volume":"23","year":"2021","journal-title":"New Media and Society"},{"key":"key2024012915083417300_ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107538","article-title":"Internet use among older adults: determinants of usage and impacts on individuals' well-being","volume":"139","year":"2023","journal-title":"Computers in Human Behavior"},{"key":"key2024012915083417300_ref120","volume-title":"What's Yours Is Mine : Against the Sharing Economy","year":"2017"},{"issue":"2","key":"key2024012915083417300_ref121","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1111\/j.1539-6924.1982.tb01369.x","article-title":"Why study risk perception?","volume":"2","year":"1982","journal-title":"Risk Analysis"},{"issue":"2","key":"key2024012915083417300_ref122","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: measuring individuals' concerns about organizational practices","volume":"20","year":"1996","journal-title":"MIS Quarterly"},{"key":"key2024012915083417300_ref123","first-page":"477","article-title":"A taxonomy of privacy","volume":"154","year":"2005","journal-title":"University of Pennsylvania Law Review"},{"key":"key2024012915083417300_ref124","volume-title":"Understanding Privacy","year":"2008"},{"key":"key2024012915083417300_ref125","doi-asserted-by":"crossref","first-page":"1487","DOI":"10.1007\/s12369-023-01043-8","article-title":"Never trust anything that can think for itself, if you can\u2019t control its privacy settings: the influence of a robot\u2019s privacy settings on users\u2019 attitudes and willingness to self-disclose","volume":"15","year":"2023","journal-title":"International Journal of Social Robotics"},{"issue":"8","key":"key2024012915083417300_ref126","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1089\/cyber.2012.0392","article-title":"Information sharing and relationships on social networking sites","volume":"16","year":"2013","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"issue":"2","key":"key2024012915083417300_ref127","doi-asserted-by":"publisher","DOI":"10.1177\/2056305115612783","article-title":"Privacy management on Facebook: do device type and location of posting matter?","volume":"1","year":"2015","journal-title":"Social Media + Society"},{"issue":"2","key":"key2024012915083417300_ref128","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1111\/jcc4.12052","article-title":"The \u2018Privacy Paradox\u2019 in the Social web: the impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure","volume":"19","year":"2014","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"4","key":"key2024012915083417300_ref129","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1093\/ct\/qtz035","article-title":"The social media privacy model: privacy and communication in the light of social media affordances","volume":"31","year":"2021","journal-title":"Communication Theory"},{"issue":"1","key":"key2024012915083417300_ref130","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1177\/1461444816660731","article-title":"Social media cultivating perceptions of privacy: a 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users","volume":"20","year":"2018","journal-title":"New Media and Society"},{"issue":"2","key":"key2024012915083417300_ref131","doi-asserted-by":"publisher","DOI":"10.1177\/2056305115616149","article-title":"Older and wiser? Facebook use, privacy concern, and privacy protection in the life stages of emerging, young, and middle adulthood","volume":"1","year":"2015","journal-title":"Social Media + Society"},{"issue":"1","key":"key2024012915083417300_ref132","first-page":"119","article-title":"Impact of social media, security risks and reputation of e-retailer on consumer buying intentions through trust in online buying: a structural equation modeling approach","volume":"7","year":"2020","journal-title":"Journal of Critical Reviews"},{"key":"key2024012915083417300_ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2019.104401","article-title":"Sharenting, is it a good or a bad thing? Understanding how adolescents think and feel about sharenting on social network sites","volume":"104","year":"2019","journal-title":"Children and Youth Services Review"},{"issue":"4","key":"key2024012915083417300_ref134","doi-asserted-by":"publisher","first-page":"246","DOI":"10.2139\/ssrn.3498766","article-title":"Perceived risk factors affecting consumers' online shopping behaviour","volume":"6","year":"2019","journal-title":"The Journal of Asian Finance, Economics and Business"},{"issue":"1","key":"key2024012915083417300_ref135","first-page":"207","article-title":"Supporting higher education with social networks: trust and privacy vs perceived effectiveness","volume":"45","year":"2021","journal-title":"Online Information Review"},{"key":"key2024012915083417300_ref136","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.954964","article-title":"Privacy concerns toward short-form video platforms: scale development and validation","volume":"13","year":"2022","journal-title":"Frontiers in Psychology"},{"key":"key2024012915083417300_ref137","volume-title":"Privacy and Freedom","year":"1970"},{"key":"key2024012915083417300_ref138","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.ijhcs.2016.09.006","article-title":"Making privacy personal: profiling social network users to inform privacy education and nudging","volume":"98","year":"2017","journal-title":"International Journal of Human-Computer Studies"},{"issue":"1","key":"key2024012915083417300_ref139","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1037\/a0028601","article-title":"Social network changes and life events across the life span: a Meta-Analysis","volume":"139","year":"2013","journal-title":"Psychological Bulletin"},{"issue":"11","key":"key2024012915083417300_ref140","doi-asserted-by":"publisher","first-page":"1539","DOI":"10.1002\/mar.21400","article-title":"How online trust evolves over time: the role of social perception","volume":"37","year":"2020","journal-title":"Psychology and Marketing"},{"issue":"1","key":"key2024012915083417300_ref141","doi-asserted-by":"crossref","first-page":"1","DOI":"10.36965\/OJAKM.2019.7(1)1-13","article-title":"Social media privacy concerns and risk beliefs","volume":"7","year":"2019","journal-title":"Online Journal of Applied Knowledge Management (OJAKM)"},{"issue":"4","key":"key2024012915083417300_ref142","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1080\/1369118X.2013.777757","article-title":"Privacy protection strategies on Facebook: the Internet privacy paradox revisited","volume":"16","year":"2013","journal-title":"Information, Communication and Society"},{"key":"key2024012915083417300_ref158","doi-asserted-by":"crossref","first-page":"102015","DOI":"10.1016\/j.ijinfomgt.2019.09.011","article-title":"A meta-analysis to explore privacy cognition and information disclosure of internet users","volume":"51","year":"2020","journal-title":"International Journal of Information Management"},{"issue":"8","key":"key2024012915083417300_ref143","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.1177\/0093650220961965","article-title":"Using a personality-profiling algorithm to investigate political microtargeting: assessing the persuasion effects of personality-tailored ads on social media","volume":"49","year":"2022","journal-title":"Communication Research"},{"key":"key2024012915083417300_ref144","article-title":"Online privacy perceptions of older adults","year":"2017"},{"key":"key2024012915083417300_ref145","first-page":"1","article-title":"What do we mean when we talk about trust in social media? A systematic review","volume-title":"Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems","year":"2023"},{"issue":"6","key":"key2024012915083417300_ref146","doi-asserted-by":"publisher","first-page":"1601","DOI":"10.1108\/ITP-03-2019-0117","article-title":"Privacy-deprived e-commerce: the efficacy of consumer privacy policies on China's e-commerce websites from a legal perspective","volume":"33","year":"2020","journal-title":"Information Technology and People"},{"issue":"2","key":"key2024012915083417300_ref147","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.im.2009.12.003","article-title":"Investigating online information disclosure: effects of information relevance, trust and risk","volume":"47","year":"2010","journal-title":"Information and Management"},{"key":"key2024012915083417300_ref148","first-page":"197","article-title":"Examining the influence of demographic factors on internet users' information privacy concerns","year":"2007"},{"key":"key2024012915083417300_ref150","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.chb.2015.07.025","article-title":"Online privacy concerns: a broad approach to understanding the concerns of different groups for different uses","volume":"53","year":"2015","journal-title":"Computers in Human Behavior"},{"key":"key2024012915083417300_ref153","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/s10551-019-04237-1","article-title":"Drivers and inhibitors of internet privacy concern: a\u00a0multidimensional development theory perspective","volume":"168","year":"2021","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"key2024012915083417300_ref155","doi-asserted-by":"publisher","first-page":"105","DOI":"10.2307\/25148783","article-title":"Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective","volume":"31","year":"2007","journal-title":"MIS Quarterly"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-07-2023-0462\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-07-2023-0462\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:52:54Z","timestamp":1753393974000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/124\/2\/640-665\/1224729"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":153,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,12,4]]},"published-print":{"date-parts":[[2024,1,30]]}},"alternative-id":["10.1108\/IMDS-07-2023-0462"],"URL":"https:\/\/doi.org\/10.1108\/imds-07-2023-0462","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2023,12,4]]}}}