{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T18:21:54Z","timestamp":1777573314360,"version":"3.51.4"},"reference-count":25,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EFI"],"published-print":{"date-parts":[[2021,12,6]]},"abstract":"<jats:p>In today\u2019s Information society it is an everyday scenario to be a part of an online community such as social media. Participation has become almost mandatory to the point of acting as a virtual extremity to one\u2019s physical environment. This virtual extremity is the individual\u2019s window to the outside world and vice versa. The process of being a part of social media has become very easy and user friendly where one is only a few private information entries away from communicating and connecting with the rest of the world. From the user\u2019s perspective it may be a small price considering what it is gained from joining an online community, but with the rise of social networking platforms, arise privacy concerns regarding social networking services. It is questionable how many social media users consider the information they upload or post about online whether it\u2019s their location, hobbies, employment places, age or any other private information. How many users actually read security and privacy terms when first registering for a social media account? What private information are individuals comfortable with entering and sharing on social networking sites? More and more loopholes are being found in social media frameworks that may compromise user\u2019s privacy or that can be misused in a way that was not intended by the user. In 2010, the Google CEO Eric Schmidt was even quoted \u201c\u2026 If we look at enough of your messaging and your location, and use artificial intelligence, we can predict where you are going to go.\u201d (Snickars, Pelle, Vonderau, 2012). That line alone raised a lot of concerns and questions about how exactly is the information users put online being used.<\/jats:p>","DOI":"10.3233\/efi-211556","type":"journal-article","created":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T21:42:30Z","timestamp":1633124550000},"page":"427-442","source":"Crossref","is-referenced-by-count":2,"title":["Measuring user confidence in social media security and privacy"],"prefix":"10.1177","volume":"37","author":[{"given":"Mirna","family":"Gilman Ranogajec","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Boris","family":"Badurina","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","reference":[{"key":"10.3233\/EFI-211556_ref1","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","article-title":"Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook","volume":"4258","author":"Acquisti","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"issue":"2","key":"10.3233\/EFI-211556_ref2","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1002\/asi.20459","article-title":"Development of Measures of Online Privacy Concern and Protection for Use on the Internet","volume":"58","author":"Buchanan","year":"2006","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"10","key":"10.3233\/EFI-211556_ref4","doi-asserted-by":"publisher","first-page":"1392","DOI":"10.1177\/0002764218792691","article-title":"Revisiting the Privacy Paradox on Social Media With an Extended Privacy Calculus Model: The Effect of Privacy Concerns, Privacy Self-Efficacy, and Social Capital on Privacy Management","volume":"62","author":"Chen","year":"2018","journal-title":"American Behavioral Scientist"},{"key":"10.3233\/EFI-211556_ref5","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1111\/jcc4.12163","article-title":"An extended privacy calculus model for SNSs: Analyzing self-disclosure and self-withdrawal in a representative U.S. sample","volume":"21","author":"Dienlin","year":"2016","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"1-2","key":"10.3233\/EFI-211556_ref8","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1080\/10696679.2017.1389242","article-title":"Private Information In A Social World: Assessing Consumers\u2019 Fear And Understanding Of Social Media Privacy","volume":"26","author":"Fox","year":"2018","journal-title":"Journal Of Marketing Theory And Practice"},{"issue":"1","key":"10.3233\/EFI-211556_ref9","doi-asserted-by":"publisher","first-page":"78","DOI":"10.22522\/cmr20190141","article-title":"Za\u0161tita privatnosti djece i maloljetnika na dru\u0161tvenoj mre\u017ei Facebook: navike i iskustva roditelja","volume":"4","author":"Grmu\u0161a","year":"2019","journal-title":"Communication Management Review"},{"issue":"2","key":"10.3233\/EFI-211556_ref11","doi-asserted-by":"publisher","first-page":"164","DOI":"10.2307\/2094393","article-title":"On the use of the mass media for important things","volume":"38","author":"Katz","year":"1973","journal-title":"American Sociological Review"},{"issue":"24","key":"10.3233\/EFI-211556_ref12","first-page":"103","article-title":"Online dru\u0161tvene mre\u017ee i dru\u0161tveno umre\u017eavanje kod u\u010denika osnovne \u0161kole: navike facebook generacije","author":"Kosi\u0107","year":"2010","journal-title":"\u017divot i \u0161kola, LVI"},{"issue":"6","key":"10.3233\/EFI-211556_ref13","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.ijinfomgt.2014.07.006","article-title":"Privacy in social networks: An analysis of Facebook","volume":"34","author":"K\u00fclc\u00fc","year":"2014","journal-title":"International Journal Of Information Management"},{"key":"10.3233\/EFI-211556_ref14","doi-asserted-by":"crossref","unstructured":"Floridi, L. (2018). Soft ethics and the governance of the digital. Philosophy and Technology, 31(1).","DOI":"10.1007\/s13347-018-0303-9"},{"key":"10.3233\/EFI-211556_ref15","doi-asserted-by":"crossref","unstructured":"Marwick, A. E., & Boyd, D. (2014). Networked privacy: How teenagers negotiate context in social media. New Media & Society, 16(7).","DOI":"10.1177\/1461444814543995"},{"issue":"3","key":"10.3233\/EFI-211556_ref17","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.chb.2009.11.012","article-title":"All about me: Disclosure in online social networking profiles: The case of Facebook","volume":"26","author":"Nosko","year":"2010","journal-title":"Computers In Human Behavior"},{"issue":"1","key":"10.3233\/EFI-211556_ref18","doi-asserted-by":"publisher","first-page":"132","DOI":"10.20901\/pm.56.1.05","article-title":"Paradoks privatnosti: empirijska provjera fenomena","volume":"56","author":"Pavuna","year":"2019","journal-title":"Politi\u010dka misao"},{"key":"10.3233\/EFI-211556_ref19","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/2660398.2660419","article-title":"Investigating the Use of a Simulator to Support Users in Anticipating Impact of Privacy Settings in Facebook","author":"Pereira Junior","year":"2014","journal-title":"Proceedings Of The 18th International Conference On Supporting Group Work"},{"issue":"4","key":"10.3233\/EFI-211556_ref20","first-page":"563","article-title":"Jesu li dru\u0161tvene mre\u017ee sigurne?","volume":"61","author":"Ru\u017ei\u0107-Baf","year":"2012","journal-title":"\u0160kolski vjesnik"},{"issue":"4","key":"10.3233\/EFI-211556_ref21","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1080\/00224545.2014.914881","article-title":"Predicting Facebook Users\u2019 Online Privacy Protection: Risk, Trust, Norm Focus Theory, and the Theory of Planned Behavior","volume":"154","author":"Saeri","year":"2014","journal-title":"The Journal Of Social Psychology"},{"key":"10.3233\/EFI-211556_ref22","doi-asserted-by":"crossref","unstructured":"Sevignani, S., (2016). Privacy and capitalism in the age of social media. New York: Routledge, p.\u00a01.","DOI":"10.4324\/9781315674841"},{"key":"10.3233\/EFI-211556_ref23","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.ijinfomgt.2018.06.006","article-title":"Examining the core knowledge on facebook","volume":"43","author":"Shiau","year":"2018","journal-title":"International Journal Of Information Management"},{"key":"10.3233\/EFI-211556_ref24","unstructured":"Snickars, P., Vonderau, P. (2012). Moving Data: The Iphone And The Future Of Media. New York: Columbia University Press."},{"issue":"1","key":"10.3233\/EFI-211556_ref25","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.chb.2012.05.026","article-title":"Does the use of social networking sites increase children\u2019s risk of harm?","volume":"29","author":"Staksrud","year":"2013","journal-title":"Computers In Human Behavior"},{"key":"10.3233\/EFI-211556_ref26","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i2.620"},{"key":"10.3233\/EFI-211556_ref27","unstructured":"Sund\u00e9n, J. (2003). Material Virtualities: Approaching Online Textual Embodiment. New York: Peter Lang."},{"issue":"1","key":"10.3233\/EFI-211556_ref28","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1177\/1461444816660731","article-title":"Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users","volume":"20","author":"Tsay-Vogel","year":"2018","journal-title":"New Media & Society"},{"issue":"3","key":"10.3233\/EFI-211556_ref29","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1111\/j.1745-6606.2008.00116.x","article-title":"Consumers\u2019 Understanding Of Privacy Rules In The Marketplace","volume":"42","author":"Turow","year":"2008","journal-title":"Journal Of Consumer Affairs"},{"issue":"3","key":"10.3233\/EFI-211556_ref32","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1177\/1745691612442904","article-title":"A Review of Facebook Research in the Social Sciences","volume":"7","author":"Wilson","year":"2012","journal-title":"Perspectives on Psychological Science"}],"container-title":["Education for Information"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/EFI-211556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T19:19:12Z","timestamp":1777403952000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/EFI-211556"}},"subtitle":[],"editor":[{"given":"Drahomira","family":"Cupar","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]},{"given":"Tatjana","family":"Aparac-Jelu\u0161i\u0107","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2021,12,6]]},"references-count":25,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/efi-211556","relation":{},"ISSN":["0167-8329","1875-8649"],"issn-type":[{"value":"0167-8329","type":"print"},{"value":"1875-8649","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,6]]}}}