{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:20:01Z","timestamp":1777936801719,"version":"3.51.4"},"reference-count":47,"publisher":"SAGE Publications","issue":"9","license":[{"start":{"date-parts":[[2016,5,12]],"date-time":"2016-05-12T00:00:00Z","timestamp":1463011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2017,9]]},"abstract":"<jats:p>Privacy is a culturally specific phenomenon. As social media platforms are going global, questions concerning privacy practices in a cross-cultural context become increasingly important. The purpose of this study is to examine cultural variations of privacy settings and self-disclosure of geolocation on Twitter. We randomly selected 3.3\u2009million Twitter accounts from more than 100 societies. Results revealed considerable cultural and societal differences. Privacy setting in collectivistic societies was more effective in encouraging self-disclosure; whereas it appeared to be less important for users in individualistic societies. Internet penetration was also a significant factor in predicting both the adoption of privacy setting and geolocation self-disclosure. However, we did not find any direct relationships between cultural values and self-disclosure.<\/jats:p>","DOI":"10.1177\/1461444816642210","type":"journal-article","created":{"date-parts":[[2016,5,12]],"date-time":"2016-05-12T21:45:27Z","timestamp":1463089527000},"page":"1476-1497","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":51,"title":["Privacy protection and self-disclosure across societies: A study of global Twitter users"],"prefix":"10.1177","volume":"19","author":[{"given":"Hai","family":"Liang","sequence":"first","affiliation":[{"name":"The University of Hong Kong, Hong Kong"}]},{"given":"Fei","family":"Shen","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong"}]},{"given":"King-wa","family":"Fu","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong"}]}],"member":"179","published-online":{"date-parts":[[2016,5,12]]},"reference":[{"key":"bibr1-1461444816642210","volume-title":"The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding","author":"Altman I","year":"1975"},{"key":"bibr2-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01883.x"},{"key":"bibr3-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801686"},{"key":"bibr4-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187907"},{"key":"bibr5-1461444816642210","doi-asserted-by":"crossref","unstructured":"Barnes SB (2006) A privacy paradox: social networking in the United States. First Monday 11(9). Available at: http:\/\/firstmonday.org\/article\/view\/1394\/1312","DOI":"10.5210\/fm.v11i9.1394"},{"key":"bibr6-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"bibr7-1461444816642210","doi-asserted-by":"crossref","unstructured":"boyd D (2006) Friends, friendsters, and myspace top 8: writing community into being on social network sites. First Monday 11(12). Available at: http:\/\/firstmonday.org\/article\/view\/1418\/1336","DOI":"10.5210\/fm.v11i12.1418"},{"key":"bibr8-1461444816642210","volume-title":"Taken out of context: American teen sociality in networked publics","author":"boyd D","year":"2008"},{"key":"bibr9-1461444816642210","doi-asserted-by":"crossref","unstructured":"boyd D, Hargittai E (2010) Facebook privacy settings: who cares? First Monday 15(8). Available at: http:\/\/firstmonday.org\/article\/view\/3086\/2589","DOI":"10.5210\/fm.v15i8.3086"},{"key":"bibr10-1461444816642210","volume-title":"A decade in Internet time: symposium on the dynamics of the Internet and society","author":"boyd D","year":"2011"},{"key":"bibr11-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1080\/0144929021000013491"},{"key":"bibr12-1461444816642210","unstructured":"Casey D (2010) Replay it: Google search across the Twitter archive. In: The official Google blog. Available at: googleblog.blogspot.hk\/2010\/04\/replay-it-google-search-across-twitter.html"},{"key":"bibr13-1461444816642210","first-page":"21","volume-title":"Computer-Mediated Communication in Personal Relationships","author":"Child JT","year":"2011"},{"key":"bibr14-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1093\/oep\/gpl024"},{"key":"bibr15-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808101618"},{"key":"bibr16-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1111\/hcre.12053"},{"key":"bibr17-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21521-6_3"},{"key":"bibr18-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1016\/j.geoforum.2010.08.003"},{"key":"bibr19-1461444816642210","unstructured":"Friedland G, Sommer R (2010) Cybercasing the joint: on the privacy implications of geo-tagging. Available at: www.usenix.org\/legacy\/events\/hotsec10\/tech\/full_papers\/Friedland.pdf"},{"key":"bibr20-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1996.tb00377.x"},{"key":"bibr21-1461444816642210","volume-title":"Culture\u2019s Consequences: International Differences in Work Related Values","author":"Hofstede G","year":"1980"},{"key":"bibr22-1461444816642210","volume-title":"Cultures and Organizations: Software of the Mind","author":"Hofstede G","year":"1991"},{"key":"bibr23-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.848917"},{"key":"bibr24-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-012-0216-6"},{"key":"bibr25-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2008.01432.x"},{"key":"bibr26-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0134270"},{"key":"bibr27-1461444816642210","doi-asserted-by":"publisher","DOI":"10.2307\/1403140"},{"key":"bibr28-1461444816642210","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2004010102"},{"key":"bibr29-1461444816642210","unstructured":"Madden M, Lenhart A, Cortesi S, et al. (2013) Teens, social media, and privacy. Available at: www.pewinternet.org\/2013\/05\/21\/teens-social-media-and-privacy"},{"key":"bibr30-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.1.35.12567"},{"key":"bibr31-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2013.17"},{"key":"bibr32-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21521-6_7"},{"key":"bibr33-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1991.tb00023.x"},{"key":"bibr34-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1353\/book4588"},{"key":"bibr35-1461444816642210","unstructured":"Rainie L, Madden M (2015) Americans\u2019 privacy strategies post-Snowden. Available at: http:\/\/www.pewinternet.org\/2015\/03\/16\/americans-privacy-strategies-post-snowden"},{"key":"bibr36-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.292"},{"key":"bibr37-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.07.022"},{"key":"bibr38-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1108\/07363760310506175"},{"key":"bibr39-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.2007.00296.x"},{"key":"bibr40-1461444816642210","volume-title":"Multilevel Analysis: An Introduction to Basic and Advanced Multilevel Modeling","author":"Snijders TAB","year":"2012","edition":"2"},{"key":"bibr41-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145320"},{"key":"bibr42-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753559"},{"key":"bibr43-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.10.017"},{"key":"bibr44-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.33"},{"key":"bibr45-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01146.x"},{"key":"bibr46-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.777757"},{"key":"bibr47-1461444816642210","doi-asserted-by":"publisher","DOI":"10.1177\/0894439310382512"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816642210","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444816642210","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816642210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:44:32Z","timestamp":1777693472000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444816642210"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,12]]},"references-count":47,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["10.1177\/1461444816642210"],"URL":"https:\/\/doi.org\/10.1177\/1461444816642210","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,12]]}}}