{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T18:51:00Z","timestamp":1767034260336},"reference-count":62,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4,1]]},"abstract":"<p>A model is developed and tested to explain the relationships among narcissism, privacy concern, vigilance, and exposure to risk on Facebook, with age and gender as controlling variables. Two important constructs are conceptualized and measured in this research. Facebook exposure is defined as the opportunity for privacy and security breaches on Facebook. Facebook vigilance is the extent to which consumers stay focused, attentive, and alert to potential security and privacy risks on Facebook by restricting who can access and post to their Facebook accounts. Data from a survey of 286 adult Facebook users in the U.S. support the hypothesized relationships in the model. Results suggest that narcissism is related to increased Facebook exposure and lower Facebook vigilance, despite greater stated concern for privacy and security. Furthermore, females and younger users have greater risk exposure compared to males and older users. Implications of the findings and future research directions are discussed.<\/p>","DOI":"10.4018\/ijthi.2014040105","type":"journal-article","created":{"date-parts":[[2014,9,18]],"date-time":"2014-09-18T12:06:08Z","timestamp":1411041968000},"page":"78-95","source":"Crossref","is-referenced-by-count":16,"title":["Narcissism as a Predictor of Facebook Users' Privacy Concern, Vigilance, and Exposure to Risk"],"prefix":"10.4018","volume":"10","author":[{"given":"Karen","family":"Smith","sequence":"first","affiliation":[{"name":"Marketing Department, Texas State University, San Marcos, TX, USA"}]},{"given":"Francis","family":"Mendez","sequence":"additional","affiliation":[{"name":"Computer Information Systems Department, Texas State University, San Marcos, TX, USA"}]},{"given":"Garry L.","family":"White","sequence":"additional","affiliation":[{"name":"Computer Information Systems Department, Texas State University, San Marcos, TX, USA"}]}],"member":"2432","reference":[{"issue":"12","key":"ijthi.2014040105-0","first-page":"711","article-title":"College students\u2019 Facebook stalking of ex-partners.","volume":"14","author":"L.Amy","year":"2011","journal-title":"Cyberpsychology (Brno)"},{"key":"ijthi.2014040105-1","doi-asserted-by":"crossref","unstructured":"Anderson, B., Woodnutt, T., Fagan, P., & Chamorro-Premuzic, T. (2012). Facebook psychology: Popular questions answered by research. American Psychological Association, 1(1), 23-27.","DOI":"10.1037\/a0026452"},{"key":"ijthi.2014040105-2","unstructured":"Armano, D. (2010). Why social sharing is bigger than Facebook & Twitter. Harvard Business Review. Retrieved from http:\/\/blogs.hbr.org\/cs\/2010\/04\/why_social_sharing_is_bigger_than_facebook.html"},{"key":"ijthi.2014040105-3","doi-asserted-by":"crossref","unstructured":"Baatarjav, E.-A., Dantu, R., & Phithakkitnukoon, S. (2008). Privacy management for Facebook. In R. Sekar, and Arun K. Pujari (Eds.), Proceedings of the 4th International Conference on Information Systems Security (ICISS 2008), Hyderabad, India.","DOI":"10.1007\/978-3-540-89862-7_23"},{"key":"ijthi.2014040105-4","author":"P.Baltzan","year":"2011","journal-title":"Information systems"},{"key":"ijthi.2014040105-5","doi-asserted-by":"publisher","DOI":"10.1037\/h0041006"},{"key":"ijthi.2014040105-6","doi-asserted-by":"publisher","DOI":"10.1177\/0146167208320061"},{"issue":"1","key":"ijthi.2014040105-7","first-page":"39","article-title":"Privacy setting awareness on Facebook and its effect on user-posted content.","volume":"14","author":"E.Butler","year":"2011","journal-title":"Human Communication"},{"key":"ijthi.2014040105-8","first-page":"115","article-title":"The narcissistic self: Background, an extended agency model, and ongoing controversies","author":"W. K.Campbell","year":"2007","journal-title":"The self: Frontiers of social psychology"},{"key":"ijthi.2014040105-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.11.011"},{"key":"ijthi.2014040105-10","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2011.0035"},{"key":"ijthi.2014040105-11","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"ijthi.2014040105-12","doi-asserted-by":"crossref","unstructured":"Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents - measurement validity and a regression model. Behaviour & Information Technology, 23(6 Nov\/Dec): 413-420.","DOI":"10.1080\/01449290410001715723"},{"key":"ijthi.2014040105-13","first-page":"408","article-title":"Privacy law and the internet","author":"R.Everett-Church","year":"2009","journal-title":"Global perspectives in information security: Legal, social, and international issues"},{"key":"ijthi.2014040105-14","unstructured":"Facebook. (2012a). Fact sheet. Retrieved from http:\/\/newsroom.fb.com\/content\/default.aspx?NewsAreaId=22"},{"key":"ijthi.2014040105-15","unstructured":"Facebook. (2012b). Safety and privacy. Retrieved from http:\/\/newsroom.fb.com\/content\/default.aspx?NewsAreaId=36"},{"key":"ijthi.2014040105-16","unstructured":"Facebook. (2013). Facebook help center - Sharing. Retrieved from http:\/\/www.facebook.com\/help\/418076994900119\/"},{"key":"ijthi.2014040105-17","doi-asserted-by":"crossref","DOI":"10.1515\/9781503620766","author":"L.Festinger","year":"1957","journal-title":"A theory of cognitive dissonance"},{"key":"ijthi.2014040105-18","unstructured":"Henningsen, A., & Hamann, J. (2006). Systemfit: A package to estimate simultaneous equation systems. In R. MPRA (Paper No. 1421). Retrieved from http:\/\/mpra.ub.uni-muenchen.de\/1421\/"},{"issue":"7","key":"ijthi.2014040105-19","first-page":"8","article-title":"The new risks of social networking.","volume":"99","author":"R.Horn","year":"2010","journal-title":"Texas Banking"},{"key":"ijthi.2014040105-20","first-page":"318","author":"J.Johnston","year":"1997","journal-title":"Econometric methods"},{"key":"ijthi.2014040105-21","author":"P.Kennedy","year":"1998","journal-title":"A guide to econometrics"},{"key":"ijthi.2014040105-22","unstructured":"Kincheloe, M. T., Weed, D., & Lack, C. W. (2010). Facebook and psychology: Use and misuse of social networks. In Recent advances in clinical medicine book series: Recent advances in biology and biomedicine (pp. 80-83)."},{"key":"ijthi.2014040105-23","doi-asserted-by":"publisher","DOI":"10.1108\/17506161011047406"},{"key":"ijthi.2014040105-24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20769-3_19"},{"key":"ijthi.2014040105-25","unstructured":"Lawler, J. P., Molluzzo, J. C., & Doshi, V. (2011, November 3-6). An expanded study of net generation perceptions on privacy and security on social networking sites (SNS). Paper presented at the Information Systems Educators I (ISECON), Wilmington, NC."},{"key":"ijthi.2014040105-26","unstructured":"MacMillan, D. (2009). Why Facebook wants your ID. Business Week."},{"key":"ijthi.2014040105-27","doi-asserted-by":"crossref","unstructured":"Manago, A. M., Taylor, T., & Greenfield, P. M. (2012). Me and my 400 friends: The anatomy of college students\u2019 Facebook networks, their communication patterns, and well-being. American Psychological Association, 48(2), 369-380.","DOI":"10.1037\/a0026338"},{"key":"ijthi.2014040105-28","year":"2009","journal-title":"2010 Threat predictions"},{"key":"ijthi.2014040105-29","doi-asserted-by":"publisher","DOI":"10.1016\/0304-4076(77)90008-2"},{"key":"ijthi.2014040105-30","unstructured":"McMillan, R. (2010). Five things you need to know; How hackers can steal your data. CIO, 23(6)."},{"key":"ijthi.2014040105-31","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2009.0257"},{"key":"ijthi.2014040105-32","author":"M. S.Merkow","year":"2006","journal-title":"Information security: Principles and practices"},{"key":"ijthi.2014040105-33","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.29.1.138"},{"key":"ijthi.2014040105-34","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2004.tb00865.x"},{"key":"ijthi.2014040105-35","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2009.02.001"},{"key":"ijthi.2014040105-36","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.11.007"},{"issue":"5","key":"ijthi.2014040105-37","first-page":"20","article-title":"Sharing location in online social networks.","volume":"24","author":"L.Nan","year":"2012","journal-title":"IEE Network"},{"key":"ijthi.2014040105-38","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"ijthi.2014040105-39","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.012"},{"key":"ijthi.2014040105-40","unstructured":"NPR. (2012). Hackers wreak havoc on 'wired' writer's digital life. Retrieved from http:\/\/m.npr.org\/news\/Technology\/158477219"},{"key":"ijthi.2014040105-41","author":"J. C.Nunnally","year":"1978","journal-title":"Psychometric theory"},{"key":"ijthi.2014040105-42","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2010.09.022"},{"key":"ijthi.2014040105-43","unstructured":"Palmer, M. (2010). Social networks face rise in hacker attacks. Financial Times, February 1."},{"key":"ijthi.2014040105-44","doi-asserted-by":"crossref","first-page":"13","DOI":"10.17705\/1CAIS.01937","article-title":"Social computing: An overview.","volume":"19","author":"M.Parameswaran","year":"2007","journal-title":"Communications of the Association for Information Systems"},{"issue":"6","key":"ijthi.2014040105-45","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1177\/001872088702900609","article-title":"Human-computer monitoring.","volume":"29","author":"R.Parasuraman","year":"1987","journal-title":"Human Factors"},{"key":"ijthi.2014040105-46","first-page":"308","author":"R. S.Pindyck","year":"1991","journal-title":"Econometric models & economic forecast"},{"key":"ijthi.2014040105-47","year":"2011","journal-title":"R: A language and environment for statistical computing"},{"key":"ijthi.2014040105-48","unstructured":"Ramsey, G. M., & Venkatesan, S. (2010). Cybercrime strategy for social networking and other online platforms. The Licensing Journal, 23-27."},{"key":"ijthi.2014040105-49","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4679(199107)47:4<490::AID-JCLP2270470404>3.0.CO;2-J"},{"key":"ijthi.2014040105-50","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.54.5.890"},{"key":"ijthi.2014040105-51","unstructured":"Reisz, S. (2005). Knowledge and vigilance: Key ingredients to information security. Catalyst, 18-23."},{"key":"ijthi.2014040105-52","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.02.004"},{"key":"ijthi.2014040105-53","unstructured":"Sarrel, M. D. (2010). Stay safe, productive on social networks. e-Week, 27(7), 12-16."},{"key":"ijthi.2014040105-54","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrp.2010.02.007"},{"key":"ijthi.2014040105-55","doi-asserted-by":"crossref","unstructured":"Social insecurity. (2010). User Reports, 75(6), 24.","DOI":"10.16935\/ejss.2010.24..003"},{"key":"ijthi.2014040105-56","unstructured":"Steel, E., & Fowler, G. A. (2010). Facebook in privacy breach; Top-ranked applications transmit personal IDs, a journal investigation finds. Wall Street Journal, October 18."},{"key":"ijthi.2014040105-57","unstructured":"Steel, E., & Vascellaro, J. E. (2010). Sites confront privacy loophole. Wall Street Journal, May 21."},{"key":"ijthi.2014040105-58","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrp.2008.06.007"},{"key":"ijthi.2014040105-59","doi-asserted-by":"publisher","DOI":"10.1518\/001872008X312152"},{"key":"ijthi.2014040105-60","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-3476(05)82654-X"},{"issue":"170","key":"ijthi.2014040105-61","first-page":"253","article-title":"A review of online social networking profiles by adolescents: Implications for future research and intervention.","volume":"43","author":"A. L.Williams","year":"2008","journal-title":"Adolescence"}],"container-title":["International Journal of Technology and Human Interaction"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=115217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:07:53Z","timestamp":1654110473000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijthi.2014040105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,4,1]]},"references-count":62,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijthi.2014040105","relation":{},"ISSN":["1548-3908","1548-3916"],"issn-type":[{"value":"1548-3908","type":"print"},{"value":"1548-3916","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,1]]}}}