{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:21:35Z","timestamp":1768256495463,"version":"3.49.0"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T00:00:00Z","timestamp":1618272000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2021,4,13]]},"abstract":"<jats:p>Privacy has been conceptualized as a multi-dimensional construct in prior research. However, most multi-dimensional conceptualizations were developed based on populations from western countries. It remains an open question whether the underlying dimensions of privacy stays consistent in non-western countries. Through a series of factor analyses on two survey datasets, we compare the dimensions of privacy concern, information disclosure, general disclosiveness, and privacy management strategies among social network users in the US, China and South Korea. We find significant cross-country differences in the dimensions of these privacy-related concepts, indicating that the fundamental understanding of these concepts varies substantially across these countries. We discuss possible explanations of these cross-country differences and make methodological suggestions for future work.<\/jats:p>","DOI":"10.1145\/3449218","type":"journal-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T17:49:24Z","timestamp":1619113764000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["How Not to Measure Social Network Privacy"],"prefix":"10.1145","volume":"5","author":[{"given":"Yao","family":"Li","sequence":"first","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Reza","family":"Ghaiumy Anaraky","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Bart","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908131.2908146"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1017\/psrm.2018.28"},{"key":"e_1_2_1_3_1","unstructured":"Brewer M.B. and Roccas S. 2001. Individual values social identity and optimal distinctiveness. Individual self relational self collective self. Psychology Press. 219--237."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20459"},{"key":"e_1_2_1_5_1","volume-title":"Facebook: A Mixed-Methods and Multinational Study.","author":"Cho H.","year":"2016","unstructured":"Cho, H. and Filippova, A. 2016. Networked Privacy Management in Facebook: A Mixed-Methods and Multinational Study. (2016)."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193120"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808101618"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-011-9658-z"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joep.2003.08.006"},{"key":"e_1_2_1_10_1","unstructured":"CNNIC: https:\/\/cnnic.com.cn\/IDR\/ReportDownloads\/. Accessed: 2020-10-04."},{"key":"e_1_2_1_11_1","unstructured":"CNNIC: 2019. https:\/\/tech.sina.com.cn\/i\/2019-02-28\/doc-ihrfqzka9673033.shtml. Accessed: 2020--10-04."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.81.5.869"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_2_1_14_1","unstructured":"Hofstede G. Hofstede G.J. and Minkov M. 2010. Cultures and Organizations: Software of the Mind Third Edition. McGraw Hill Professional."},{"key":"e_1_2_1_15_1","unstructured":"House R.J. Hanges P.J. Javidan M. Dorfman P.W. and Gupta V. 2004. Culture Leadership and Organizations: The GLOBE Study of 62 Societies. SAGE Publications."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23528-4_65"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359230"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858415"},{"key":"e_1_2_1_19_1","volume-title":"AMCIS 2011 Proceedings","author":"Karr-Wisniewski P.","year":"2011","unstructured":"Karr-Wisniewski, P., Wilson, D.C. and Richter-Lipford, H. 2011. A New Social Order: Mechanisms for Social Network Site Boundary Regulation. AMCIS 2011 Proceedings (Detroit, MI, Aug. 2011), Paper 101."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.08.015"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.06.003"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.307"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.73.5.1038"},{"key":"e_1_2_1_24_1","first-page":"8","article-title":"Testing for Measurement Invariance: Does your measure mean the same thing for different participants","volume":"31","author":"Lee S.T.H.","year":"2018","unstructured":"Lee, S.T.H. 2018. Testing for Measurement Invariance: Does your measure mean the same thing for different participants? APS Observer. 31, 8 (Sep. 2018).","journal-title":"APS Observer."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","unstructured":"Liu Z. and Wang X. 2018. How to regulate individuals' privacy boundaries on social network sites: A cross-cultural comparison. Information & Management. (May 2018). DOI:https:\/\/doi.org\/10.1016\/j.im.2018.05.006.","DOI":"10.1016\/j.im.2018.05.006"},{"key":"e_1_2_1_26_1","unstructured":"Lusoli W. Bacigalupo M. Lupi\u00e1\u00f1ez-Villanueva F. Andrade N. Monteleone S. and Maghiros I. 2012. Pan-European Survey of Practices Attitudes and Policy Preferences as Regards Personal Identity Data Management. Technical Report #ID 2086579. Social Science Research Network."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_2_1_28_1","first-page":"1","article-title":"Information Privacy","volume":"11","author":"Milberg S.J.","year":"2000","unstructured":"Milberg, S.J., Smith, H.J. and Burke, S.J. 2000. Information Privacy: Corporate Management and National Regulation. Organization Science. 11, 1 (Jan. 2000), 35--57.","journal-title":"Corporate Management and National Regulation. Organization Science."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.128.1.3"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.12.001"},{"key":"e_1_2_1_31_1","volume-title":"Computers in Human Behavior. 49","author":"Peters A.N.","year":"2015","unstructured":"Peters, A.N., Winschiers-Theophilus, H. and Mennecke, B.E. 2015. Cultural influences on Facebook practices: A comparative study of college students in Namibia and the United States. Computers in Human Behavior. 49, (2015), 259--271."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.15"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.07.022"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025926"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0901_2"},{"key":"e_1_2_1_38_1","volume-title":"H.C. Triandis, \u00c7. K\u00e2\u011fit\u00e7iba?i,, S. -C, and G","author":"Schwartz S.H.","unstructured":"Schwartz, S.H. 1994. Beyond individualism\/collectivism: New cultural dimensions of values. Individualism and collectivism: Theory, method, and applications. U. Kim, H.C. Triandis, \u00c7. K\u00e2\u011fit\u00e7iba?i,, S. -C, and G. Yoon, eds. Sage Publications, Inc. 85--119."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the 3rd ACM conference on electronic commerce","author":"Spiekermann S.","year":"2001","unstructured":"Spiekermann, S., Grossklags, J. and Berendt, B. 2001. E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior. Proceedings of the 3rd ACM conference on electronic commerce (Tampa, FL, 2001), 38--47."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.70.3.136"},{"key":"e_1_2_1_43_1","unstructured":"Triandis H.C. 1995. Individualism & collectivism. Westview Press."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.54.2.323"},{"key":"e_1_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Tsoi H.K. and Chen L. 2011. From Privacy Concern to Uses of Social Network Sites: A Cultural Comparison via User Survey. Privacy security risk and trust (passat) 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom) (Oct. 2011) 457--464.","DOI":"10.1109\/PASSAT\/SocialCom.2011.71"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732762"},{"key":"e_1_2_1_47_1","volume-title":"Chinese and Indian Users' Privacy Concerns on Social Network Sites. Proceedings of the 4th International Conference on Trust and Trustworthy Computing","author":"Wang Y.","year":"2011","unstructured":"Wang, Y., Norcie, G. and Cranor, L.F. 2011. Who is Concerned About What? A Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites. Proceedings of the 4th International Conference on Trust and Trustworthy Computing (Berlin, Heidelberg, 2011), 146--153."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1976.tb00494.x"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.03810"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207761"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.09.006"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02249397"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-005-0456-y"},{"key":"e_1_2_1_54_1","volume-title":"Privacy in Online Social Networks. Proceedings of the 2011 International Conference on Information Systems","author":"Zhang N.","year":"2011","unstructured":"Zhang, N., Wang, C. and Xu, Y. 2011. Privacy in Online Social Networks. Proceedings of the 2011 International Conference on Information Systems (Shanghai, China, Dec. 2011)."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3449218","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3449218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:22Z","timestamp":1750195702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3449218"}},"subtitle":["A Cross-Country Investigation"],"short-title":[],"issued":{"date-parts":[[2021,4,13]]},"references-count":54,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2021,4,13]]}},"alternative-id":["10.1145\/3449218"],"URL":"https:\/\/doi.org\/10.1145\/3449218","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,13]]},"assertion":[{"value":"2021-04-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}