14 research outputs found

    PARADOKS PRIVASI: ONLINE SELF-DISCLOSURE DITINJAU DARI PRIVACY CONCERN PADA PENGGUNA INSTAGRAM USIA EMERGING ADULTHOOD

    Get PDF
    Media sosial merupakan platform untuk dapat menampilkan diri dan berbagi informasi diri dengan orang lain. Membagikan informasi diri yang tidak mengenal batasan kemudian dapat menimbulkan masalah pada pengguna berupa risiko terhadap privasi diri yang dapat disalahgunakan oleh orang yang tidak bertanggung jawab. Penelitian ini bertujuan untuk mengetahui apakah terdapat pengaruh dari privacy concern terhadap online self-disclosure pada pengguna media sosial Instagram usia emerging adulthood. Penelitian ini menggunakan teori Johari Window untuk menjelaskan online self-disclosure dan teori manajemen privasi komunikasi untuk privacy concern. Partisipan dalam penelitian  berjumlah 230 partisipan terdiri dari 150 wanita dan 80 pria. Partisipan berada pada rentang usia emerging adulthood yaitu usia 18 – 24 tahun. Hasil penelitian menunjukkan bahwa terdapat hubungan positif antara privacy concern dan online self-disclosure, hal ini menunjukkan bahwa kesadaran partisipan terhadap batasan privasi bukan menjadi alasan utama partisipan untuk mengatur online self-disclosure mereka. Hal tersebut menjelaskan hasil uji hipotesis dalam penelitian ini yang mendapatkan hasil bahwa privacy concern memiliki pengaruh terhadap online self-disclosure pada pengguna media sosial Instagram usia emerging adulthood namun dalam kategori lemah. Terdapat faktor-faktor dari variabel lain yang tidak diteliti dalam penelitian ini dan dapat menjadi saran dalam penelitian selanjutnya

    Fake Profile Identification on Online Social Networks

    Get PDF
    Online social networks are web-based applications that allow user to communicate and share knowledge and information. The number of users who make use of these platforms are experiencing rapid growth both in profile creation and social interaction. However, intruders and malicious attackers have found their way into the networks, using fake profiles, thus exposing user to serious security and privacy problem.  Every user in the online social network should verify and authenticate their identities, with the other users as they interact. However, currently verification of user’s profiles and identities is faced with challenges, to the extent that a user may represent their identity with many profiles without any effective method of identity verification. As a result of this vulnerability, attackers create fake profiles which they use in attacking the online social system. In addition, online social networks use a logically centered architecture, where their control and management are under a service; provider, who must be entrusted with the security of data and communication traces; this further increases the vulnerability to attacks and online threats. In this paper, we demonstrate the causes and effects of fake profiles on online social networks, and then provide a review of the state-of-the-art mechanism for identifying and mitigating fake profiles on online social networks. Keywords: online social networks, fake profiles, sybil attack, fake account

    Dilution of Social Media Privacy: Security Vulnerabilities and Psychological Implications

    Get PDF
    In the contemporary society, Facebook, WhatsApp, Twitter, and Instagram are not merely words, but are synonymous to a person’s identity. Though the extensive use of social media is capable of rendering a huge amount of benefits in terms of ease of communication, lightening marketing reach and so on, the graver sides of the same requires thorough research to evaluate its role in modelling the psychological structure of the society and the possible threats it poses to the new generation who are glued to the use of social media platforms on a daily basis. This paper aims to perform a deep dive into the psychological effects of social media platforms on the young population and attempts to experimentally relate the same with dilution of social media privacy as a possible side effect. At the same time, possible alternatives and corrective measures to such a problem are also suggested

    Your Privacy Is Your Friend's Privacy: Examining Interdependent Information Disclosure on Online Social Networks

    Get PDF
    The highly interactive nature of interpersonal communication on online social networks (OSNs) impels us to think about privacy as a communal matter, with users' private information being revealed by not only their own voluntary disclosures, but also the activities of their social ties. The current privacy literature has identified two types of information disclosures in OSNs: self-disclosure, i.e., the disclosure of an OSN user's private information by him/herself; and co-disclosure, i.e., the disclosure of the user's private information by other users. Although co-disclosure has been increasingly identified as a new source of privacy threat inherent to the OSN context, few systematic attempts have been made to provide a framework for understanding the commonalities and distinctions between self- vs. co-disclosure, especially pertaining to different types of private information. To address this gap, this paper presents a data-driven study that builds upon an innovative measurement for quantifying the extent to which others' co-disclosure could lead to actual privacy harm. The results demonstrate the significant harm caused by co-disclosure and illustrate the differences between the identity elements revealed through self- and co-disclosure

    Your Privacy Is Your Friend\u27s Privacy: Examining Interdependent Information Disclosure on Online Social Networks

    Get PDF
    The highly interactive nature of interpersonal communication on online social networks (OSNs) impels us to think about privacy as a communal matter, with users\u27 private information being revealed by not only their own voluntary disclosures, but also the activities of their social ties. The current privacy literature has identified two types of information disclosures in OSNs: self-disclosure, i.e., the disclosure of an OSN user\u27s private information by him/herself; and co-disclosure, i.e., the disclosure of the user\u27s private information by other users. Although co-disclosure has been increasingly identified as a new source of privacy threat inherent to the OSN context, few systematic attempts have been made to provide a framework for understanding the commonalities and distinctions between self- vs. co-disclosure, especially pertaining to different types of private information. To address this gap, this paper presents a data-driven study that builds upon an innovative measurement for quantifying the extent to which others\u27 co-disclosure could lead to actual privacy harm. The results demonstrate the significant harm caused by co-disclosure and illustrate the differences between the identity elements revealed through self- and co-disclosure

    Protecting Privacy on Social Media: Is Consumer Privacy Self-Management Sufficient?

    Get PDF
    Among the existing solutions for protecting privacy on social media, a popular doctrine is privacy self-management, which asks users to directly control the sharing of their information through privacy settings. While most existing research focuses on whether a user makes informed and rational decisions on privacy settings, we address a novel yet important question of whether these settings are indeed effective in practice. Specifically, we conduct an observational study on the effect of the most prominent privacy setting on Twitter, the protected mode. Our results show that, even after setting an account to protected, real-world account owners still have private information continuously disclosed, mostly through tweets posted by the owner’s connections. This illustrates a fundamental limit of privacy self-management: its inability to control the peer-disclosure of privacy by an individual’s friends. Our results also point to a potential remedy: A comparative study before vs after an account became protected shows a substantial decrease of peer-disclosure in posts where the other users proactively mention the protected user, but no significant change when the other users are reacting to the protected user’s posts. In addition, peer-disclosure through explicit specification, such as the direct mentioning of a user’s location, decreases sharply, but no significant change occurs for implicit inference, such as the disclosure of birthday through the date of a “happy birthday” message. The design implication here is that online social networks should provide support alerting users of potential peer-disclosure through implicit inference, especially when a user is reacting to the activities of a user in the protected mode

    Replication of Internet Privacy Concerns in the Mobile Banking Context

    Get PDF
    This study is a conceptual replication of the work of Hong and Thong (2013), who developed the Internet Privacy Concerns scale to measure individuals’ concerns regarding how personal information is handled by websites. We adapt the wording of the original survey items to the context of mobile banking and follow the same procedures to assess the scale. The replication results reinforce the stability and applicability of the scale over the years and in different scenarios. In contrast with the original study, however, we detect a high correlation between the Control and Awareness dimensions, suggesting the design of an additional second-order dimension that we label “exposure management” (individuals’ consciousness about existing controls that mitigate the risks of personal data loss)

    Measuring Individuals\u27 Concerns over Collective Privacy on Social Networking Sites

    Get PDF
    With the rise of social networking sites (SNSs), individuals not only disclose personal information but also share private information concerning others online. While shared information is co-constructed by self and others, personal and collective privacy boundaries become blurred. Thus there is an increasing concern over information privacy beyond the individual level. Drawing on the Communication Privacy Management theory, we conceptualize individuals\u27 concerns over collective privacy on SNSs, with three distinctive dimensions—collective information access, control and diffusion, and develop a scale of collective SNS privacy concern (SNSPC) through empirical validation. Structural model analyses confirm the three-dimension structure of collective SNSPC and indicate perceived risk and propensity to value privacy as two antecedents. We discuss key findings, implications and future research directions for theorizing and examining privacy as a collective issue

    Giving Users Control Over How Peers Handle Their Data: A Design Science Study

    Get PDF
    In today’s interconnected world, Internet users are increasingly concerned about losing control over the data they share with peers, which indicates a need for higher levels of control and notification mechanisms. We address this need by building on design science methodology and developing a socio-technical artifact, i.e., a peer-privacy-friendly online messaging service. We draw on Malhotra et al.’s (2004) Internet Users’ Information Privacy Concerns framework and refine and evaluate our artifact via focus groups, interviews, and a survey among users of online messaging services. Our artifact provides senders with the ability to control how their personal information is processed by peers and allows receivers to be made aware of the sender’s privacy expectations. We contribute to the growing literature on peer privacy concerns by developing and evaluating design requirements, principles, and an instantiation that can mitigate peer privacy concerns that go beyond concerns about organizational data practices

    Home quarantined: Privacy at risk in technologically-oriented learning amidst COVID-19 pandemic

    Get PDF
    The COVID-19 triggers technologically-oriented learning and is critical in ensuring that education continues after schools close physically. The internet has a plethora of learning opportunities but may invite privacy risks to users. Using descriptive-comparative research design, the study determined the contents and artifacts exchanged in online portals, the extent of use of social media sites, teaching-learning platforms, and educational websites. The sample was 341 college students of a family-owned private higher education institution. Finally, the difference in online privacy risk management practices was determined when grouped by selected demographic variables. Using means, t-test, and ANOVA, findings from an online survey showed that personal information is shared the most in online portals. For online learning, students heavily relied on Facebook, Microsoft Teams, and Google. To protect their privacy, respondents from all classes follow online management practices. Generally, the respondents' good affordances and decorum in the online media imply that they have good behavior and value creation. Still, a comprehensive strategy to safeguard data among learners in the utilization of online productivity platforms is a must
    corecore