{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T16:40:08Z","timestamp":1654101608292},"reference-count":33,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7,1]]},"abstract":"
People have been using Social Network Sites (SNS) to communicate and make friends online. Although SNS offer many benefits to users, information privacy seems to be overlooked. Based on the Protection Motivation Theory, this study investigated the factors that might influence youths to disclose information about themselves on the SNS. Four factors were investigated to determine whether there are significant relationships between them and information disclosure. The factors were perceived vulnerability, perceived severity, perceived benefits and self-efficacy. A self-administered questionnaire was developed to capture useful information pertaining to the subject matter. Using university students as sample, five hundred questionnaires were distributed and four hundred and eighty six were collected for further analysis. The results revealed that perceived vulnerability, perceived benefits and self-efficacy were significantly related to information disclosure, while perceived severity was not significantly related.<\/p>","DOI":"10.4018\/jitr.2012070105","type":"journal-article","created":{"date-parts":[[2012,11,12]],"date-time":"2012-11-12T20:51:27Z","timestamp":1352753487000},"page":"85-97","source":"Crossref","is-referenced-by-count":0,"title":["An Empirical Investigation on Internet Privacy on Social Network Sites among Malaysian Youths"],"prefix":"10.4018","volume":"5","author":[{"given":"Norsaremah","family":"Salleh","sequence":"first","affiliation":[{"name":"International Islamic University Malaysia, Malaysia"}]},{"given":"Ramlah","family":"Hussein","sequence":"additional","affiliation":[{"name":"Sri Jentayu Sdn Bh, Kuala Lumpur, Malaysia"}]},{"given":"Norshidah","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Universiti Teknologi Malaysia, Malaysia"}]}],"member":"2432","reference":[{"key":"jitr.2012070105-0","doi-asserted-by":"crossref","unstructured":"Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In G. Danezis & P. Golle (Eds.), Proceedings of the 6th International Workshop on Privacy Enhancing Technologies (LNCS 4258, pp. 36-58).","DOI":"10.1007\/11957454_3"},{"key":"jitr.2012070105-1","doi-asserted-by":"crossref","unstructured":"Ahern, S., Eckles, D., Good, N., King, S., Naamon, M., & Nair, R. (2007). Over-exposed? Privacy patterns and consideration in online and mobile photo sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 357-366).","DOI":"10.1145\/1240624.1240683"},{"key":"jitr.2012070105-2","unstructured":"Banks, M. S., Onita, C. G., & Meservy, T. O. (2010). Risky behaviour in online social media: Protection motivation and social influence. In Proceedings of the Americas Conference on Information Systems (paper 372)."},{"key":"jitr.2012070105-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2009.03.006"},{"key":"jitr.2012070105-4","doi-asserted-by":"crossref","unstructured":"Dey, R., Jelveh, Z., & Ross, K. W. (2012). Facebook users have become much more private: A large-scale study. In Proceedings of the Workshop on Pervasive Computing and Communications (pp. 346-352).","DOI":"10.1109\/PerComW.2012.6197508"},{"key":"jitr.2012070105-5","doi-asserted-by":"publisher","DOI":"10.1080\/01449290410001715723"},{"key":"jitr.2012070105-6","unstructured":"Facebook Newsroom. (2012). Fact sheet. Retrieved February 22, 2012, from http:\/\/newsroom.fb.com\/content\/default.aspx?NewsAreaId=22"},{"key":"jitr.2012070105-7","doi-asserted-by":"crossref","unstructured":"Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks (The Facebook case). In Proceedings of the ACM Workshop on Privacy in the Electronic Society (pp. 71-80).","DOI":"10.1145\/1102199.1102214"},{"key":"jitr.2012070105-8","author":"J.Hair","year":"1998","journal-title":"Multivariate data analysis"},{"key":"jitr.2012070105-9","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"issue":"1","key":"jitr.2012070105-10","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","article-title":"Fear appeals and information security behaviours: An empirical study.","volume":"34","author":"A.Johnston","year":"2010","journal-title":"Management Information Systems Quarterly"},{"key":"jitr.2012070105-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.07.001"},{"key":"jitr.2012070105-12","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., & Wills, C. E. (2008). Characterizing privacy in online social networks. In Proceedings of the First Workshop on Online Social Networks (pp. 37-42).","DOI":"10.1145\/1397735.1397744"},{"key":"jitr.2012070105-13","doi-asserted-by":"crossref","unstructured":"Lampe, C., Ellison, N. B., & Steinfield, C. (2008). Changes in use and perception of Facebook. In Proceedings of the ACM Conference on Computer Supported Cooperative Work (pp. 721-730).","DOI":"10.1145\/1460563.1460675"},{"key":"jitr.2012070105-14","doi-asserted-by":"publisher","DOI":"10.1145\/1325555.1325569"},{"key":"jitr.2012070105-15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2008.01432.x"},{"key":"jitr.2012070105-16","unstructured":"Lipford, H. R., Besmer, A., & Watson, J. (2008). Understanding privacy settings in Facebook with an audience view. In Proceedings of the 1st Conference on Usability, Psychology and Security (article 2)."},{"key":"jitr.2012070105-17","doi-asserted-by":"crossref","unstructured":"Liu, Y., Krishnamurthy, B., Gummadi, K. P., & Mislove, A. (2011). Analyzing Facebook privacy settings: User expectation vs. reality. In Proceedings of the ACM SIGCOMM Conference on Internet Measurement Conference (pp. 61-70).","DOI":"10.1145\/2068816.2068823"},{"key":"jitr.2012070105-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.07.008"},{"key":"jitr.2012070105-19","author":"J. F.Pallant","year":"2007","journal-title":"SPSS survival manual"},{"key":"jitr.2012070105-20","unstructured":"Rifon, N. J., LaRose, R., & Lewis, M. L. (2007). Resolving the privacy paradox: Toward a social-cognitive theory of consumer privacy protection. Retrieved March 17, 2011, from https:\/\/www.msu.edu\/~wirthch1\/privacyparadox07.pdf"},{"key":"jitr.2012070105-21","first-page":"153","article-title":"Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation","author":"R. W.Rogers","year":"1983","journal-title":"Social psychophysiology"},{"key":"jitr.2012070105-22","first-page":"113","article-title":"Protection motivation theory","volume":"Vol. 1","author":"R. W.Rogers","year":"1997","journal-title":"Handbook of health behaviour research"},{"key":"jitr.2012070105-23","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.35"},{"key":"jitr.2012070105-24","doi-asserted-by":"crossref","unstructured":"Strater, K., & Lipford, H. R. (2008). Strategies and struggles with privacy in an online social networking community. In Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction (pp. 111-119).","DOI":"10.14236\/ewic\/HCI2008.11"},{"key":"jitr.2012070105-25","doi-asserted-by":"crossref","unstructured":"Strater, K., & Richter, H. (2007). Examining privacy and disclosure in a social networking community. In Proceedings of the Symposium on Usable Privacy and Security, Pittsburgh, PA (pp. 157-158).","DOI":"10.1145\/1280680.1280706"},{"key":"jitr.2012070105-26","unstructured":"Stutzman, F. (2005). An evaluation of identity-sharing behavior in social network communities. Retrieved October 2, 2006, from http:\/\/Ibiblio.org"},{"key":"jitr.2012070105-27","author":"A.Westin","year":"1967","journal-title":"Privacy and freedom"},{"key":"jitr.2012070105-28","unstructured":"Wirth, C. B., Rifon, N. J., LaRose, R., & Lewis, M. L. (2007). Promoting teenage online safety with an i-Safety intervention enhancing self-efficacy and protective behaviour. Retrieved March 17, 2011, from https:\/\/www.msu.edu\/~wirthch1\/childsafety07.pdf"},{"key":"jitr.2012070105-29","doi-asserted-by":"publisher","DOI":"10.4018\/jebr.2009040102"},{"key":"jitr.2012070105-30","unstructured":"Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual\u2019s privacy concerns: Toward an integrative view. In Proceedings of the International Conference on Information Systems (paper 6)."},{"key":"jitr.2012070105-31","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01146.x"},{"key":"jitr.2012070105-32","doi-asserted-by":"crossref","unstructured":"Young, A. L., & Quan-Hasse, A. (2009). Information revelation and Internet privacy concerns on social network sites: A case study of Facebook. In Proceedings of the Fourth International Conference on Communities and Technologies (pp. 265-274).","DOI":"10.1145\/1556460.1556499"}],"container-title":["Journal of Information Technology Research"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=72716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T16:04:45Z","timestamp":1654099485000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jitr.2012070105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,7,1]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,7]]}},"URL":"http:\/\/dx.doi.org\/10.4018\/jitr.2012070105","relation":{},"ISSN":["1938-7857","1938-7865"],"issn-type":[{"value":"1938-7857","type":"print"},{"value":"1938-7865","type":"electronic"}],"subject":["General Computer Science"],"published":{"date-parts":[[2012,7,1]]}}}