skip to main content
10.1145/1518701.1518754acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
short-paper

Social computing privacy concerns: antecedents and effects

Published:04 April 2009Publication History

ABSTRACT

Social computing systems are increasingly a part of people's social environment. Inherent to such communities is the collection and sharing of personal information, which in turn may raise concerns about privacy. In this study, we extend prior research on internet privacy to address questions about antecedents of privacy concerns in social computing communities, as well as the impact of privacy concerns in such communities. The results indicate that users' trust in other community members, and the community's information sharing norms have a negative impact on community-specific privacy concerns. We also find that community-specific privacy concerns not only lead users to adopt more restrictive information sharing settings, but also reduce the amount of information they share with the community. In addition, we find that information sharing is impacted by network centrality and the tenure of the user in the community. Implications of the study for research and practice are discussed.

References

  1. Ames, M. and Naaman, M. Why we tag: motivations for annotation in mobile and online media. In Proc. CHI 2007, ACM Press, (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Awad, N. and Krishnan, M. The Personalization Privacy Paradox. MIS Quarterly 30,1 (2006), 13--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bock, G., Zmud, R., Kim, Y. and Lee, J. Behavioral Intention Formation in Knowledge Sharing, MIS Quarterly 29,1 (2005), 87--111 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Boyd, D. Friendster and Publicly Articulated Social Networks. In Proc. CHI 2004, ACM Press, (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Brown, J. and Duguid, P. Organizational Learning and Communities-of-Practice. Org. Sci. 2,1 (1991), 40--57.Google ScholarGoogle ScholarCross RefCross Ref
  6. Campbell A.J. Relationship Marketing in Consumer Markets. J. of Direct Marketing, 11, 3 (1997), 44 -- 57.Google ScholarGoogle Scholar
  7. Constant, D. Sproull, L. and Kiesler, S. The Kindness of Strangers. Org. Sci. 7,2 (1996), 119--135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Culnan, M. and Armstrong, K. Information privacy concerns, procedural fairness, and impersonal trust. Org. Sci. 10,1, (1999), 104--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Culnan M. and Bies R. Consumer Privacy: Balancing Economic and Justice Considerations. J. of Social Issues 59,2, (2003), 323--342.Google ScholarGoogle Scholar
  10. Dinev, T. and Hart, P. An Extended Privacy Calculus Model for E-Commerce Transactions, Information Systems Research 17,1, (2006), 61--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Freeman L. Centrality in Social Networks: Conceptual Clarification. Social Networks 1,3, (1979), 215--239.Google ScholarGoogle Scholar
  12. Gross, R. and Acquisti, A. Information Revelation and Privacy in Online Social Networks. In Proc. of the Workshop on privacy in the Electronic Society, (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Malhotra, N. Kim, S. and Agarwal, J. Internet Users' Information Privacy Concerns (IUIPC). Information Systems Research 15,4, (2004), 336--355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. McKnight, D., Choudhury, V., and Kacmar, C. Developing and Validating Trust Measures for e-Commerce. Info. Sys. Research 13,3, (2002), 334--359. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Nov, O. What Motivates Wikipedians, Communications of the ACM 50,11, (2007), 60--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Nov, O. Naaman, M. and Ye, C. What Drives Content Tagging: the case for photos on Flickr. In Proc. CHI 2008, ACM Press, (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Parameswaran, M., Whinston, A.B. Social Computing: An Overview, Communications of the Association for Information Systems 19,37, (2007),762--780.Google ScholarGoogle ScholarCross RefCross Ref
  18. Pavlou, P., Liang, H, and Xue, Y. Understanding and Mitigating Uncertainty in Online Exchange Relationships. MIS Quarterly 31,1, (2007), 105--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Postmes, T., Spears, R., and Lea, M. The formation of group norms in computer-mediated communication. Human Communication Research 26, (2000), 341--371.Google ScholarGoogle ScholarCross RefCross Ref
  20. Strandburg K.J. Social Norms, Self Control, and Privacy. In World Privacy and Technologies of Identity Ed. K. Strandburg and D. Raicu. Springer, (2005).Google ScholarGoogle Scholar
  21. Tajfel, H. Interindividual behavior and Intergroup Behavior, In Differentiation between social groups. Academic Press, (1978), 27--60.Google ScholarGoogle Scholar
  22. Wasko, M. and Faraj, S. Why Should I Share? Examining Social Capital and Knowledge Contributions. MIS Quarterly 29,1, (2005), 35--57. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Social computing privacy concerns: antecedents and effects

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '09: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      April 2009
      2426 pages
      ISBN:9781605582467
      DOI:10.1145/1518701

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 April 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      CHI '09 Paper Acceptance Rate277of1,130submissions,25%Overall Acceptance Rate6,199of26,314submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader