{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T18:50:33Z","timestamp":1771354233508,"version":"3.50.1"},"reference-count":97,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JD"],"published-print":{"date-parts":[[2023,4,4]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>While anonymous online interactions could be helpful and less risky, they are usually not enough for LGBTQ+\u00a0people to satisfy the need of expressing their marginalized identity to networks of known ties (i.e. on identified social media like Facebook, WeChat, and TikTok). However, identified social media bring LGBTQ+\u00a0people both sources and challenges like \u201ccontext collapse\u201d that flattens diverse networks or audiences that are originally separated. Previous studies focus on LGBTQ+\u00a0people's disclosure and responses to context collapse, few studies investigate how their perceptions of context collapse are shaped and their privacy management beyond regulating disclosure on social media. Drawing on identity theory and communication privacy management (CPM), this study aims to investigate how the need of LGBTQ+\u00a0people for self-identity affects their perceived context collapse and results in privacy management on identified social media.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>Given the target population is LGBTQ+\u00a0people, The authors recruited participants through active LGBTQ+\u00a0online communities, influential LGBTQ+\u00a0activists, and the snowballing sampling. The authors empirically examined the proposed model using the PLS-SEM technique with a valid sample of 232 respondents concerning their identity practices and privacy management on WeChat, a typical and popular identified social media in China.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The results suggested that the need for expressing the self and the need for maintaining continuity of self-identity have significant influences on perceived context collapse, but vary in directions. The perceived context collapse will motivate LGBTQ+\u00a0individuals to engage in privacy management to readjust rules on ownership, access, and extension. However, only ownership management helps them regain the perceived privacy control on social media.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This study incorporated and highlighted the influence of LGBTQ+\u00a0identity in shaping context collapse and online privacy management. This study contributes to the literature on privacy and information communication and yields practical implications, especially on improving privacy-related interactive design for identified social media services.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jd-04-2022-0080","type":"journal-article","created":{"date-parts":[[2022,10,7]],"date-time":"2022-10-07T12:35:12Z","timestamp":1665146112000},"page":"718-742","source":"Crossref","is-referenced-by-count":9,"title":["Beyond disclosure: the role of self-identity and context collapse in privacy management on identified social media for LGBTQ+ people"],"prefix":"10.1108","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9519-3807","authenticated-orcid":false,"given":"Xinlin","family":"Yao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9281-3030","authenticated-orcid":false,"given":"Yuxiang Chris","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6302-5000","authenticated-orcid":false,"given":"Shijie","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7058-1208","authenticated-orcid":false,"given":"Xiaolun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2022,10,10]]},"reference":[{"issue":"6221","key":"key2023040305112327800_ref001","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.aaa1465","article-title":"Privacy and human behavior in the age of information","volume":"347","year":"2015","journal-title":"Science"},{"key":"key2023040305112327800_ref002","volume-title":"The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding","year":"1975"},{"issue":"3","key":"key2023040305112327800_ref003","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3386600","article-title":"Disclosure, privacy, and stigma on social media: examining non-disclosure of distressing experiences","volume":"27","year":"2020","journal-title":"ACM Transactions on Computer-Human Interaction (TOCHI)"},{"issue":"5","key":"key2023040305112327800_ref004","doi-asserted-by":"crossref","first-page":"1820","DOI":"10.1016\/j.chb.2011.04.002","article-title":"Internet use and online social support among same sex attracted individuals of different ages","volume":"27","year":"2011","journal-title":"Computers in Human Behavior"},{"key":"key2023040305112327800_ref005","article-title":"Mobile application security: role of perceived privacy as the predictor of security perceptions","volume":"52","year":"2020","journal-title":"International Journal of Information Management"},{"issue":"4","key":"key2023040305112327800_ref006","article-title":"\u2018Essentially made of information\u2019: concepts and implications of informational privacy","volume":"24","year":"2019","journal-title":"Information Research"},{"issue":"7","key":"key2023040305112327800_ref007","doi-asserted-by":"crossref","first-page":"2296","DOI":"10.1177\/1461444817714790","article-title":"Context collapse and privacy management: diversity in Facebook friends increases online news reading and sharing","volume":"20","year":"2018","journal-title":"New Media and Society"},{"key":"key2023040305112327800_ref008","first-page":"610","article-title":"LGBT parents and social media: advocacy, privacy, and disclosure during shifting social movements","year":"2016"},{"key":"key2023040305112327800_ref009","unstructured":"Boyd, D. (2010), \u201cSocial network sites as networked publics: affordances, dynamics, and implications\u201d, in Papacharissi, Z. (Ed.), A Networked Self: Identity, Community, and Culture on Social Network Sites, Routledge, New York, pp.\u00a039-58."},{"issue":"1","key":"key2023040305112327800_ref010","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","article-title":"Social network sites: definition, history, and scholarship","volume":"13","year":"2007","journal-title":"Journal of Computer\u2010Mediated Communication"},{"issue":"1","key":"key2023040305112327800_ref011","article-title":"Time collapse in social media: extending the context collapse","volume":"4","year":"2018","journal-title":"Social Media+ Society"},{"issue":"3","key":"key2023040305112327800_ref012","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1177\/135910457000100301","article-title":"Back-translation for cross-cultural research","volume":"1","year":"1970","journal-title":"Journal of Cross-Cultural Psychology"},{"issue":"5","key":"key2023040305112327800_ref013","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1177\/1461444805056011","article-title":"Outing PlanetOut: surveillance, gay marketing and internet affinity portals","volume":"7","year":"2005","journal-title":"New Media and Society"},{"issue":"2","key":"key2023040305112327800_ref014","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1080\/15538605.2017.1310006","article-title":"Transition, connection, disconnection, and social media: examining the digital lived experiences of transgender individuals","volume":"11","year":"2017","journal-title":"Journal of LGBT Issues in Counseling"},{"issue":"11","key":"key2023040305112327800_ref015","article-title":"Social media interventions to promote HIV testing, linkage, adherence, and retention: systematic review and meta-analysis","volume":"19","year":"2017","journal-title":"Journal of Medical Internet Research"},{"key":"key2023040305112327800_ref016","first-page":"1","article-title":"Queer visibility: supporting LGBT+ selective visibility on social media","year":"2018"},{"issue":"4","key":"key2023040305112327800_ref017","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1287\/isre.2016.0672","article-title":"Assessing the impact of granular privacy controls on content sharing and disclosure on Facebook","volume":"27","year":"2016","journal-title":"Information Systems Research"},{"key":"key2023040305112327800_ref018","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.chb.2016.07.051","article-title":"A tool for help or harm? How associations between social networking use, social support, and mental health differ for sexual minority and heterosexual youth","volume":"65","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"key2023040305112327800_ref019","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1016\/j.chb.2015.08.035","article-title":"Fuzzy Facebook privacy boundaries: exploring mediated lurking, vague-booking, and Facebook privacy management","volume":"54","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"10","key":"key2023040305112327800_ref020","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1002\/asi.21122","article-title":"Blogging, communication, and privacy management: development of the blogging privacy management measure","volume":"60","year":"2009","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"5","key":"key2023040305112327800_ref021","doi-asserted-by":"crossref","first-page":"1859","DOI":"10.1016\/j.chb.2012.05.004","article-title":"Blogging privacy rule orientations, privacy management, and content deletion practices: the variability of online privacy management activity at different stages of social media use","volume":"28","year":"2012","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"key2023040305112327800_ref022","first-page":"295","article-title":"The partial least squares approach to structural equation modeling","volume":"295","year":"1998","journal-title":"Modern Methods for Business Research"},{"issue":"9","key":"key2023040305112327800_ref023","doi-asserted-by":"crossref","first-page":"3183","DOI":"10.1177\/1461444817744784","article-title":"Default publicness: queer youth of color, social media, and being outed by the machine","volume":"20","year":"2018","journal-title":"New Media and Society"},{"issue":"3","key":"key2023040305112327800_ref024","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3193120","article-title":"Collective privacy management in social media: a cross-cultural validation","volume":"25","year":"2018","journal-title":"ACM Transactions on Computer-Human Interaction (TOCHI)"},{"key":"key2023040305112327800_ref025","first-page":"114","article-title":"The Facebook revolution: LGBT identity and activism","volume-title":"LGBT Identity and Online New Media","year":"2010"},{"issue":"1","key":"key2023040305112327800_ref026","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1002\/aris.2007.1440410113","article-title":"Context in information behavior research","volume":"41","year":"2007","journal-title":"Annual Review of Information Science and Technology"},{"issue":"4","key":"key2023040305112327800_ref027","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1080\/1369118X.2014.888458","article-title":"Context collapse: theorizing context collusions and collisions","volume":"17","year":"2014","journal-title":"Information, Communication and Society"},{"issue":"6","key":"key2023040305112327800_ref028","doi-asserted-by":"crossref","first-page":"1058","DOI":"10.1177\/1461444819876570","article-title":"Contextualizing how teens manage personal and interpersonal privacy on social media","volume":"22","year":"2020","journal-title":"New Media and Society"},{"key":"key2023040305112327800_ref029","first-page":"1","article-title":"Too gay for Facebook' presenting LGBTQ+ identity throughout the personal social media ecosystem","year":"2018"},{"issue":"3","key":"key2023040305112327800_ref030","doi-asserted-by":"crossref","first-page":"35","DOI":"10.4018\/IJEP.2016070103","article-title":"Feeling (dis) connected: diasporic LGBTQs and digital media","volume":"7","year":"2016","journal-title":"International Journal of E-Politics (IJEP)"},{"issue":"4","key":"key2023040305112327800_ref031","article-title":"Navigating online selves: social, cultural, and material contexts\u00a0of\u00a0social media use by diasporic gay men","volume":"2","year":"2016","journal-title":"Social Media+ Society"},{"issue":"6","key":"key2023040305112327800_ref032","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1080\/01449290410001715723","article-title":"Internet privacy concerns and their antecedents-measurement validity and a regression model","volume":"23","year":"2004","journal-title":"Behaviour and Information Technology"},{"issue":"1","key":"key2023040305112327800_ref033","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","year":"2006","journal-title":"Information Systems Research"},{"issue":"6","key":"key2023040305112327800_ref034","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1177\/1461444814549930","article-title":"\u2018He has a way gayer Facebook than I do\u2019: investigating sexual identity disclosure and context collapse on a social networking site","volume":"18","year":"2016","journal-title":"New Media and Society"},{"issue":"1","key":"key2023040305112327800_ref035","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1111\/jcc4.12180","article-title":"Explicating affordances: a conceptual framework for understanding affordances in communication research","volume":"22","year":"2017","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"4","key":"key2023040305112327800_ref036","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1108\/JD-11-2019-0217","article-title":"\u2018Write the story you want to read\u2019: world-queering through slash fanfiction creation","volume":"76","year":"2020","journal-title":"Journal of Documentation"},{"issue":"1","key":"key2023040305112327800_ref037","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.lisr.2019.01.001","article-title":"Entertainment media and the information practices of queer individuals","volume":"41","year":"2019","journal-title":"Library and Information Science Research"},{"key":"key2023040305112327800_ref038","article-title":"\u2018Expanding on the almost\u2019: queer world-building and institutional information worlds","volume":"3","year":"2021","journal-title":"Journal of Critical Library and Information Studies"},{"issue":"1","key":"key2023040305112327800_ref039","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"key":"key2023040305112327800_ref040","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1016\/j.chb.2016.06.009","article-title":"Queer identity online: informal learning and teaching experiences of LGBTQ+ individuals on social media","volume":"65","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2023040305112327800_ref041","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1111\/jcom.12137","article-title":"Queer identity management and political self-expression on social networking sites: a co-cultural approach to the spiral of silence","volume":"65","year":"2015","journal-title":"Journal of Communication"},{"key":"key2023040305112327800_ref096","first-page":"91","article-title":"A practical guide to factorial validity using PLS-Graph: tutorial and annotated example","volume":"16","year":"2005","journal-title":"Communications of the Association for Information Systems"},{"issue":"3","key":"key2023040305112327800_ref042","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1093\/jcmc\/zmy006","article-title":"One size fits all: context collapse, self-presentation strategies and language styles on Facebook","volume":"23","year":"2018","journal-title":"Journal of Computer-Mediated Communication"},{"key":"key2023040305112327800_ref043","first-page":"71","article-title":"Information revelation and privacy in online social networks","year":"2005"},{"key":"key2023040305112327800_ref044","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.chb.2018.12.011","article-title":"What happens online stays online? \u2014social media dependency, online support behavior and offline effects for LGBT","volume":"93","year":"2019","journal-title":"Computers in Human Behavior"},{"issue":"8","key":"key2023040305112327800_ref045","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.1177\/0163443719846612","article-title":"\u2018That's not necessarily for them\u2019: LGBTIQ+ young people, social media platform affordances and identity curation","volume":"41","year":"2019","journal-title":"Media, Culture and Society"},{"issue":"3","key":"key2023040305112327800_ref046","article-title":"Privacy management among social media natives: an exploratory study of Facebook and Snapchat","volume":"5","year":"2019","journal-title":"Social Media+ Society"},{"issue":"1","key":"key2023040305112327800_ref047","doi-asserted-by":"crossref","first-page":"275","DOI":"10.25300\/MISQ\/2013\/37.1.12","article-title":"Internet privacy concerns: an integrated conceptualization and four empirical studies","volume":"37","year":"2013","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2023040305112327800_ref048","article-title":"Embodied cognition and information experiences of transgender people","volume":"24","year":"2019","journal-title":"Information Research"},{"issue":"2","key":"key2023040305112327800_ref049","first-page":"361","article-title":"Characteristics of the health information seeking behavior of LGBTQ+ individuals: a systematic review on information types, information sources and influencing factors","volume":"78","year":"2021","journal-title":"Journal of Documentation"},{"key":"key2023040305112327800_ref050","article-title":"Privacy concerns and benefits of engagement with social media-enabled apps: a privacy calculus perspective","volume":"107","year":"2020","journal-title":"Computers in Human Behavior"},{"issue":"7","key":"key2023040305112327800_ref051","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v23i7.9264","article-title":"\u2018I pretended to be a boy on the Internet\u2019: navigating affordances and constraints of social networking sites and search engines for LGBTQ+ identity work","volume":"23","year":"2018","journal-title":"First Monday"},{"issue":"12","key":"key2023040305112327800_ref052","doi-asserted-by":"crossref","first-page":"1340","DOI":"10.1002\/asi.24217","article-title":"\u2018That looks like me or something I can do\u2019: affordances and constraints in the online identity work of US LGBTQ+ millennials","volume":"70","year":"2019","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"3","key":"key2023040305112327800_ref053","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1108\/JD-08-2020-0138","article-title":"Discursive power and resistance in the information world maps of lesbian, gay, bisexual, transgender, queer, intersex and asexual community leaders","volume":"77","year":"2021","journal-title":"Journal of Documentation"},{"issue":"4","key":"key2023040305112327800_ref054","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1002\/asi.24594","article-title":"Advancing information practices theoretical discourses centered on marginality, community, and embodiment: learning from the experiences of lesbian, gay, bisexual, transgender, queer, intersex, and asexual (LGBTQIA+) communities","volume":"73","year":"2022","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"key2023040305112327800_ref055","first-page":"1","article-title":"Privacy and activism in the transgender community","year":"2020"},{"issue":"1","key":"key2023040305112327800_ref056","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/25148781","article-title":"Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2023040305112327800_ref057","first-page":"434","article-title":"Beyond information: the role of territory in privacy management behavior on social networking sites","volume":"20","year":"2019","journal-title":"Journal of the Association for Information Systems"},{"key":"key2023040305112327800_ref058","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1016\/j.chb.2014.04.027","article-title":"A bumpy ride on the information superhighway: exploring turbulence online","volume":"36","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2023040305112327800_ref059","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model","volume":"15","year":"2004","journal-title":"Information Systems Research"},{"key":"key2023040305112327800_ref097","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.chb.2017.10.025","article-title":"Trumped by context collapse: examination of \u2018Liking\u2019 political candidates in the presence of audience diversity","volume":"79","year":"2018","journal-title":"Computers in Human Behavior"},{"key":"key2023040305112327800_ref060","doi-asserted-by":"crossref","unstructured":"Marwick, A.E. (2013), \u201cOnline identity\u201d, in Hartley, J., Burgess, J. and Bruns, A. (Eds.), A Companion to New Media Dynamics, John Wiley & Sons, pp.\u00a0355-364.","DOI":"10.1002\/9781118321607.ch23"},{"issue":"1","key":"key2023040305112327800_ref061","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1177\/1461444810365313","article-title":"I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience","volume":"13","year":"2011","journal-title":"New Media and Society"},{"issue":"3","key":"key2023040305112327800_ref062","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1080\/08838151.2012.705197","article-title":"\u2018There isn't Wifi in heaven!\u2019 Negotiating visibility on Facebook\u00a0memorial pages","volume":"56","year":"2012","journal-title":"Journal of Broadcasting and Electronic Media"},{"key":"key2023040305112327800_ref063","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.chb.2017.07.026","article-title":"Identity, victimization, and support: Facebook experiences and mental health among LGBTQ youth","volume":"76","year":"2017","journal-title":"Computers in Human Behavior"},{"key":"key2023040305112327800_ref064","article-title":"Resistance and sexuality in virtual worlds: an LGBT perspective","volume":"105","year":"2020","journal-title":"Computers in Human Behavior"},{"issue":"13","key":"key2023040305112327800_ref065","doi-asserted-by":"crossref","first-page":"2078","DOI":"10.1002\/asi.20672","article-title":"Making sense of credibility on the Web: models for evaluating online information and recommendations for future research","volume":"58","year":"2007","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key2023040305112327800_ref095","volume-title":"No Sense of Place: The Impact of Electronic Media on Social Behavior","year":"1985"},{"key":"key2023040305112327800_ref066","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","year":"2010"},{"issue":"4","key":"key2023040305112327800_ref067","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1080\/00918369.2016.1194112","article-title":"Is it Facebook official? Coming out and passing strategies of young adult gay men on social media","volume":"64","year":"2017","journal-title":"Journal of Homosexuality"},{"issue":"6","key":"key2023040305112327800_ref068","doi-asserted-by":"crossref","first-page":"642","DOI":"10.1057\/s41303-017-0056-z","article-title":"Antecedents and outcomes of information privacy concerns in a peer context: an exploratory study","volume":"26","year":"2017","journal-title":"European Journal of Information Systems"},{"key":"key2023040305112327800_ref069","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","year":"2002"},{"issue":"3","key":"key2023040305112327800_ref070","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1080\/00909880701422443","article-title":"Translational research endeavors and the practices of communication privacy management","volume":"35","year":"2007","journal-title":"Journal of Applied Communication Research"},{"issue":"2","key":"key2023040305112327800_ref071","doi-asserted-by":"crossref","first-page":"298","DOI":"10.2307\/259124","article-title":"Toward a theory of psychological ownership in organizations","volume":"26","year":"2001","journal-title":"Academy of Management Review"},{"key":"key2023040305112327800_ref072","first-page":"1","article-title":"LGBTQ+ persons' pregnancy loss disclosures to known ties on social media: disclosure decisions and ideal disclosure environments","year":"2021"},{"key":"key2023040305112327800_ref073","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1057\/s41270-019-00058-3","article-title":"Partial least squares structural equation modeling using SmartPLS: a software review","volume":"7","year":"2019","journal-title":"Journal of Marketing Analytics"},{"key":"key2023040305112327800_ref074","first-page":"1","article-title":"For you, or for \u2018you\u2019? Everyday LGBTQ+ encounters with TikTok","year":"2021"},{"issue":"9","key":"key2023040305112327800_ref075","doi-asserted-by":"crossref","first-page":"1074","DOI":"10.1002\/asi.24342","article-title":"\u2018I don't want someone to watch me while I'm working\u2019: gendered views of facial recognition technology in workplace surveillance","volume":"71","year":"2020","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"5","key":"key2023040305112327800_ref076","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1108\/AJIM-02-2019-0040","article-title":"\u2018Hard to find\u2019: information barriers among LGBT college students","volume":"71","year":"2019","journal-title":"Aslib Journal of Information Management"},{"key":"key2023040305112327800_ref077","article-title":"How live streaming influences purchase intentions in social commerce: an IT affordance perspective","volume":"37","year":"2019","journal-title":"Electronic Commerce Research and Applications"},{"issue":"8","key":"key2023040305112327800_ref078","doi-asserted-by":"crossref","first-page":"1729","DOI":"10.1177\/1461444820981009","article-title":"The management of LGBTQ+ identities on social media: a student perspective","volume":"24","year":"2022","journal-title":"New Media and Society"},{"issue":"1","key":"key2023040305112327800_ref079","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1177\/1461444819890353","article-title":"Context collapse and anonymity among queer Reddit users","volume":"23","year":"2021","journal-title":"New Media and Society"},{"issue":"4","key":"key2023040305112327800_ref080","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1080\/08838151.2012.732140","article-title":"The impact of context collapse and privacy on social network site disclosures","volume":"56","year":"2012","journal-title":"Journal of Broadcasting and Electronic Media"},{"issue":"2","key":"key2023040305112327800_ref081","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1177\/1461444812451566","article-title":"\u2018There's a network out there you might as well tap\u2019: exploring the benefits of and barriers to exchanging informational and support-based resources on Facebook","volume":"15","year":"2013","journal-title":"New Media and Society"},{"key":"key2023040305112327800_ref082","first-page":"1485","article-title":"Balancing audience and privacy tensions on social network sites: strategies of highly engaged users","volume":"9","year":"2015","journal-title":"International Journal of Communication"},{"issue":"1","key":"key2023040305112327800_ref083","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s11747-015-0455-4","article-title":"Discriminant validity testing in marketing: an analysis, causes for concern, and proposed remedies","volume":"44","year":"2016","journal-title":"Journal of the Academy of Marketing Science"},{"key":"key2023040305112327800_ref084","doi-asserted-by":"publisher","DOI":"10.1177\/01655515211040658","article-title":"\u2018Access necessitates being seen\u2019: queer visibility and intersectional embodiment within the health information practices of queer community leaders","year":"2021","journal-title":"Journal of Information Science"},{"issue":"1","key":"key2023040305112327800_ref085","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1111\/j.1083-6101.2011.01559.x","article-title":"Exploring privacy management on Facebook: motivations and perceived consequences of voluntary disclosure","volume":"17","year":"2011","journal-title":"Journal of Computer-Mediated Communication"},{"key":"key2023040305112327800_ref086","first-page":"609","article-title":"Fighting for my space: coping mechanisms for SNS boundary regulation","year":"2012"},{"issue":"3","key":"key2023040305112327800_ref087","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1002\/asi.24113","article-title":"The privacy paradox in the context of online social networking: a self\u2010identity perspective","volume":"70","year":"2019","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"4","key":"key2023040305112327800_ref088","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1002\/asi.24232","article-title":"A contextual approach to information privacy research","volume":"71","year":"2020","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"key2023040305112327800_ref089","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.chb.2016.11.069","article-title":"How WeChat can retain users: roles of network externalities, social interaction ties, and perceived values in building continuance intention","volume":"69","year":"2017","journal-title":"Computers in Human Behavior"},{"key":"key2023040305112327800_ref090","first-page":"4286","article-title":"Autonomous and interdependent: collaborative privacy management on social networking sites","year":"2016"},{"issue":"2","key":"key2023040305112327800_ref091","first-page":"185","article-title":"Psychological ownership motivation and use of social media","volume":"23","year":"2015","journal-title":"Journal of Marketing Theory and Practice"},{"issue":"4","key":"key2023040305112327800_ref092","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.25300\/MISQ\/2013\/37.4.07","article-title":"Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users","volume":"37","year":"2013","journal-title":"MIS Quarterly"},{"key":"key2023040305112327800_ref093","article-title":"Examining the formation of individual's privacy concerns: toward an integrative view","year":"2008"},{"issue":"12","key":"key2023040305112327800_ref094","doi-asserted-by":"crossref","first-page":"798","DOI":"10.17705\/1jais.00281","article-title":"Information privacy concerns: linking individual perceptions with institutional privacy assurances","volume":"12","year":"2011","journal-title":"Journal of the Association for Information Systems"}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-04-2022-0080\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-04-2022-0080\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:33:53Z","timestamp":1753396433000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/79\/3\/718-742\/194888"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":97,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2022,10,10]]},"published-print":{"date-parts":[[2023,4,4]]}},"alternative-id":["10.1108\/JD-04-2022-0080"],"URL":"https:\/\/doi.org\/10.1108\/jd-04-2022-0080","relation":{},"ISSN":["0022-0418"],"issn-type":[{"value":"0022-0418","type":"print"}],"subject":[],"published":{"date-parts":[[2022,10,10]]}}}