Skip to main content
Top

2021 | OriginalPaper | Chapter

9. Sustaining Social Cohesion in Information and Knowledge Society: The Priceless Value of Privacy

Authors : Stefanos Gritzalis, Maria Sideri, Angeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis

Published in: Advances in Core Computer Science-Based Technologies

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Within Information and Knowledge Society the concept of Privacy has been enriched including aspects related to digital life, while the right to online Privacy gains more and more attention daily due to several cases of privacy breaches. Privacy is associated with the control, access and use or misuse of personal information by others, including governments, companies and other users as well. Social Network Sites as a part of digital space have altered the way that people communicate and have contributed to the construction of online social networks. During online interaction, users disclose information about them or others, while at the same time they express their concerns about Privacy infringement that may come up due to self-disclosure practices, not restricting or reversing though their disclosure behavior. Thus the “Privacy paradox” phenomenon is recorded since users cannot balance between Privacy concerns and their need for disclosure. Privacy’s circumvention destabilizes the trust between social actors, increases the feelings of insecurity and puts into risk social cohesion which is a prerequisite for the sustainability of our society. Legislation as well as technology may protect us, but sometimes they are not user friendly and sufficient. Users should protect themselves and other people in order to preserve their Privacy as a fundamental human right. In this paper, based on a literature review, we present the issue of Privacy in Social Network Sites focusing on factors that affect people’s Privacy concerns and behavior while relating these to social cohesion.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference U. Beck, Risk Society Towards a New Modernity (Sage, London, 1992) U. Beck, Risk Society Towards a New Modernity (Sage, London, 1992)
2.
go back to reference S. Chtouris, Rational Symbolic Networks—Global States and National Hobbit (Nisos Publ, Athens, 2004). (in Greek) S. Chtouris, Rational Symbolic Networks—Global States and National Hobbit (Nisos Publ, Athens, 2004). (in Greek)
3.
go back to reference L.F. Berkman, T. Glass, Social integration, social networks, social support and health, in Social Epidemiology, ed. by L.F. Berkman, I. Kawachi (Oxford University Press, New York, 2000), pp. 158–162 L.F. Berkman, T. Glass, Social integration, social networks, social support and health, in Social Epidemiology, ed. by L.F. Berkman, I. Kawachi (Oxford University Press, New York, 2000), pp. 158–162
5.
go back to reference K. Walker, A. Macbride, M.L.S. Vachon, Social support networks and the crisis of bereavement. Soc. Sci. Med. 11, 34–41 (1997) K. Walker, A. Macbride, M.L.S. Vachon, Social support networks and the crisis of bereavement. Soc. Sci. Med. 11, 34–41 (1997)
6.
go back to reference K.Y. Lin, H.P. Lu, Why people use social networking sites: an empirical study integrating network externalities and motivation theory. Comput. Hum. Behav. 27(3), 1152–1161 (2011)MathSciNetCrossRef K.Y. Lin, H.P. Lu, Why people use social networking sites: an empirical study integrating network externalities and motivation theory. Comput. Hum. Behav. 27(3), 1152–1161 (2011)MathSciNetCrossRef
7.
go back to reference P. Pai, D.C. Arnott, User adoption of social networking sites: eliciting uses and gratifications through a means–end approach. Comput. Hum. Behav. 29(3), 1039–1053 (2013)CrossRef P. Pai, D.C. Arnott, User adoption of social networking sites: eliciting uses and gratifications through a means–end approach. Comput. Hum. Behav. 29(3), 1039–1053 (2013)CrossRef
8.
go back to reference S. Gritzalis, Enhancing web privacy and anonymity in the digital era. Inf. Manag. Comput. Secur. 12(3), 255–288 (2004)CrossRef S. Gritzalis, Enhancing web privacy and anonymity in the digital era. Inf. Manag. Comput. Secur. 12(3), 255–288 (2004)CrossRef
9.
go back to reference L. Mitrou, Privacy protection in information and communication technology—the legal dimension, in Privacy and Information and Communication Technologies—Technical and Legal Issues, ed. by C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. Katsikas (Papasotiriou Publ., Athens, 2010), pp. 505–551. (in Greek) L. Mitrou, Privacy protection in information and communication technology—the legal dimension, in Privacy and Information and Communication Technologies—Technical and Legal Issues, ed. by C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. Katsikas (Papasotiriou Publ., Athens, 2010), pp. 505–551. (in Greek)
10.
go back to reference T. Jones, T. Newburn, Private Security and Public Policing (Clarendon, Oxford, 1998) T. Jones, T. Newburn, Private Security and Public Policing (Clarendon, Oxford, 1998)
11.
go back to reference G.T. Marx, Murky conceptual waters: the public and the private. Ethics Inf. Technol. 3(3), 157–169 (2001)CrossRef G.T. Marx, Murky conceptual waters: the public and the private. Ethics Inf. Technol. 3(3), 157–169 (2001)CrossRef
12.
go back to reference J. Panousis, Symbolic Constructions of Reality (Entelecheia Publ, Athens, 2004). (in Greek) J. Panousis, Symbolic Constructions of Reality (Entelecheia Publ, Athens, 2004). (in Greek)
13.
go back to reference Α. Kitsiou, The social construction of crime in Information Society: the paradigm of free software movement. Ph.D. thesis. Department of Sociology, University of the Aegean, 2014 (in Greek) Α. Kitsiou, The social construction of crime in Information Society: the paradigm of free software movement. Ph.D. thesis. Department of Sociology, University of the Aegean, 2014 (in Greek)
14.
go back to reference J. Kallas, Information Society and the Role of Social Sciences (Nefeli Publ, Athens, 2006). (in Greek) J. Kallas, Information Society and the Role of Social Sciences (Nefeli Publ, Athens, 2006). (in Greek)
15.
go back to reference J.L. Cebrian, Τhe Network (Stachi, Αthens, 2000). (in Greek) J.L. Cebrian, Τhe Network (Stachi, Αthens, 2000). (in Greek)
16.
go back to reference L. Mitrou, Law in Information Society (Sakkoulas Publ, Athens, 2002). (in Greek) L. Mitrou, Law in Information Society (Sakkoulas Publ, Athens, 2002). (in Greek)
17.
go back to reference E. Simon, Introduction to the legal frame of information society, in Information Society, Studies on Information Society. From Theory to Political Practice, ed. by R. Pinter (Gondolat, Budapest, 2008) E. Simon, Introduction to the legal frame of information society, in Information Society, Studies on Information Society. From Theory to Political Practice, ed. by R. Pinter (Gondolat, Budapest, 2008)
18.
go back to reference K.T. Lee, M.J. Noh, D.M. Koo, Lonely people are no longer lonely on social networking sites: the mediating role of self-disclosure and social support. Cyberpsychol. Behav. Soc. Netw. 16(6), 413–418 (2013)CrossRef K.T. Lee, M.J. Noh, D.M. Koo, Lonely people are no longer lonely on social networking sites: the mediating role of self-disclosure and social support. Cyberpsychol. Behav. Soc. Netw. 16(6), 413–418 (2013)CrossRef
19.
go back to reference E.M. Bryant, J. Marmo, A. Ramirez Jr., A functional approach to social networking sites, in Computer-Mediated Communication in Personal Relationships, ed. by K.B. Wright, L.M. Webb (Peter Lang, New York, 2011), pp. 3–20 E.M. Bryant, J. Marmo, A. Ramirez Jr., A functional approach to social networking sites, in Computer-Mediated Communication in Personal Relationships, ed. by K.B. Wright, L.M. Webb (Peter Lang, New York, 2011), pp. 3–20
20.
go back to reference J. Kim, J.R. Lee, The Facebook paths to happiness: effects of the number of Facebook friends and self-presentation on subjective wellbeing. Cyberpsychol. Behav. Soc. Netw. 14, 359–364 (2011)CrossRef J. Kim, J.R. Lee, The Facebook paths to happiness: effects of the number of Facebook friends and self-presentation on subjective wellbeing. Cyberpsychol. Behav. Soc. Netw. 14, 359–364 (2011)CrossRef
21.
go back to reference T.A. Pempek, Y.A. Yermolayeva, S.L. Yermolayeva, College students’ social networking experiences on Facebook. J. Appl. Dev. Psychol. 30, 227–238 (2009)CrossRef T.A. Pempek, Y.A. Yermolayeva, S.L. Yermolayeva, College students’ social networking experiences on Facebook. J. Appl. Dev. Psychol. 30, 227–238 (2009)CrossRef
22.
go back to reference J.A. Bargh, K. McKenna, The Internet and social life. Annu. Rev. Psychol. 55, 573–590 (2004)CrossRef J.A. Bargh, K. McKenna, The Internet and social life. Annu. Rev. Psychol. 55, 573–590 (2004)CrossRef
24.
go back to reference M. Trusov, R.E. Bucklin, K. Pauwels, Effects of word-of-mouth versus traditional marketing: findings from an internet social networking site. J. Mark. 73, 90–102 (2009)CrossRef M. Trusov, R.E. Bucklin, K. Pauwels, Effects of word-of-mouth versus traditional marketing: findings from an internet social networking site. J. Mark. 73, 90–102 (2009)CrossRef
25.
go back to reference Z. Papacharissi (ed.), A Networked Self: Identity, Community, and Culture on Social Network Sites (Routledge, New York, 2011) Z. Papacharissi (ed.), A Networked Self: Identity, Community, and Culture on Social Network Sites (Routledge, New York, 2011)
26.
go back to reference S. Conger, J.H. Pratt, K.D. Loch, Personal information privacy and emerging technologies. Inf. Syst. J. 23(5), 401–417 (2013)CrossRef S. Conger, J.H. Pratt, K.D. Loch, Personal information privacy and emerging technologies. Inf. Syst. J. 23(5), 401–417 (2013)CrossRef
27.
go back to reference V. Benson, G. Saridakis, H. Tennakoon, Information disclosure of social media users. Does control over personal information, user awareness and security notices matter? Inf. Technol. People28(3), 426–441 (2015) V. Benson, G. Saridakis, H. Tennakoon, Information disclosure of social media users. Does control over personal information, user awareness and security notices matter? Inf. Technol. People28(3), 426–441 (2015)
28.
go back to reference M. Taddicken, The ‘privacy paradox in the social web: the impact of privacy concerns, individual characteristics and the perceived social relevance on different forms of self-disclosure. J. Comput.-Mediat. Commun. 19(2), 248–273 (2014)CrossRef M. Taddicken, The ‘privacy paradox in the social web: the impact of privacy concerns, individual characteristics and the perceived social relevance on different forms of self-disclosure. J. Comput.-Mediat. Commun. 19(2), 248–273 (2014)CrossRef
29.
go back to reference F. Stutzman, J. Vitak, N.B. Ellison, R. Gray, C. Lampe, Privacy in interaction: exploring disclosure and social capital in Facebook, in Proceedings of the Sixth International Conference on Weblogs and Social Media (AAAI org, Ireland, Dublin, 2012), pp. 330–337 F. Stutzman, J. Vitak, N.B. Ellison, R. Gray, C. Lampe, Privacy in interaction: exploring disclosure and social capital in Facebook, in Proceedings of the Sixth International Conference on Weblogs and Social Media (AAAI org, Ireland, Dublin, 2012), pp. 330–337
30.
go back to reference N. Ellison, J. Vitak, C. Steinfield, R. Gray, C. Lampe, Negotiating privacy concerns and social capital needs in a social media environment, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 19–32CrossRef N. Ellison, J. Vitak, C. Steinfield, R. Gray, C. Lampe, Negotiating privacy concerns and social capital needs in a social media environment, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 19–32CrossRef
31.
go back to reference M. Ziegele, O. Quiring, Privacy in social network sites, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 175–189CrossRef M. Ziegele, O. Quiring, Privacy in social network sites, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 175–189CrossRef
32.
go back to reference S.A. Rains, S.R. Brunner, The outcomes of broadcasting self-disclosure using new communication technologies responses to disclosure vary across one’s social network. Commun. Res. 45(5), 659–687 (2015)CrossRef S.A. Rains, S.R. Brunner, The outcomes of broadcasting self-disclosure using new communication technologies responses to disclosure vary across one’s social network. Commun. Res. 45(5), 659–687 (2015)CrossRef
33.
go back to reference N.N. Bazarova, Y.H. Choi, Self-disclosure in social media: extending the functional approach to self-disclosure motivations and characteristics on social network sites. J. Commun. 64, 635–657 (2014)CrossRef N.N. Bazarova, Y.H. Choi, Self-disclosure in social media: extending the functional approach to self-disclosure motivations and characteristics on social network sites. J. Commun. 64, 635–657 (2014)CrossRef
34.
go back to reference T. Spiliotopoulos, I. Oakley, Understanding motivations for Facebook use: usage metrics, network structure, and privacy, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (ACM, Paris, France, 2013), pp. 3287–3296 T. Spiliotopoulos, I. Oakley, Understanding motivations for Facebook use: usage metrics, network structure, and privacy, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (ACM, Paris, France, 2013), pp. 3287–3296
35.
go back to reference S.C. Walton, R.E. Rice, Mediated disclosure on Twitter: the roles of gender and identity in boundary impermeability, valence, disclosure, and stage. Comput. Hum. Behav. 29, 1465–1474 (2013)CrossRef S.C. Walton, R.E. Rice, Mediated disclosure on Twitter: the roles of gender and identity in boundary impermeability, valence, disclosure, and stage. Comput. Hum. Behav. 29, 1465–1474 (2013)CrossRef
36.
go back to reference I. Buschel, R. Mehdi, A. Cammilleri, Y. Marzouki, B. Elger, Protecting human health and security in digital Europe: how to deal with the “privacy paradox”? Sci. Eng. Ethics 20, 639–658 (2014)CrossRef I. Buschel, R. Mehdi, A. Cammilleri, Y. Marzouki, B. Elger, Protecting human health and security in digital Europe: how to deal with the “privacy paradox”? Sci. Eng. Ethics 20, 639–658 (2014)CrossRef
37.
go back to reference S. Petronio, Boundary of Privacy: Dialectics of Disclosure (State University of New York Press, Albany, 2002) S. Petronio, Boundary of Privacy: Dialectics of Disclosure (State University of New York Press, Albany, 2002)
38.
go back to reference M. Nguyen, Y.S. Bin, A. Campbell, Comparing online and offline self-disclosure: a systematic review. Cyberpsychol. Behav. Soc. Netw. 15(2), 103–111 (2012)CrossRef M. Nguyen, Y.S. Bin, A. Campbell, Comparing online and offline self-disclosure: a systematic review. Cyberpsychol. Behav. Soc. Netw. 15(2), 103–111 (2012)CrossRef
40.
go back to reference A. Acquisti, R. Gross, Imagined communities: awareness, information sharing, and privacy on the Facebook, in Proceedings of the 6th Workshop on Privacy Enhancing Technologies (PET '06), ed. by G. Danezis, P. Golle (Robinson College, Cambridge, UK, 2006), pp. 36–58 A. Acquisti, R. Gross, Imagined communities: awareness, information sharing, and privacy on the Facebook, in Proceedings of the 6th Workshop on Privacy Enhancing Technologies (PET '06), ed. by G. Danezis, P. Golle (Robinson College, Cambridge, UK, 2006), pp. 36–58
41.
go back to reference Y.M. Baek, Solving the privacy paradox: a counter-argument experimental approach. Comput. Hum. Behav. 38, 33–42 (2014)CrossRef Y.M. Baek, Solving the privacy paradox: a counter-argument experimental approach. Comput. Hum. Behav. 38, 33–42 (2014)CrossRef
42.
go back to reference T. Dienlin, S. Trepte, Putting the social (psychology) into social media is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. Eur. J. Soc. Psychol. 45, 285–297 (2015)CrossRef T. Dienlin, S. Trepte, Putting the social (psychology) into social media is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. Eur. J. Soc. Psychol. 45, 285–297 (2015)CrossRef
43.
go back to reference Sp. Kokolakis, Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017) Sp. Kokolakis, Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)
44.
go back to reference C. Cheung, Z. W. Y. Lee, T. K. H. Chan, Self-disclosure in social networking sites. Internet Res. 25(2), 279–299 (2015) C. Cheung, Z. W. Y. Lee, T. K. H. Chan, Self-disclosure in social networking sites. Internet Res. 25(2), 279–299 (2015)
45.
go back to reference H. Krasnova, S. Spiekermann, K. Koroleva, T. Hildebrand, Online social networks: why we disclose. J. Inf. Technol. 25, 109–125 (2010)CrossRef H. Krasnova, S. Spiekermann, K. Koroleva, T. Hildebrand, Online social networks: why we disclose. J. Inf. Technol. 25, 109–125 (2010)CrossRef
46.
go back to reference W.M. Klein, Z. Kunda, Exaggerated self-assessments and the preference for controllable risks. Organ. Behav. Hum. Decis. Process. 59, 410–427 (1994)CrossRef W.M. Klein, Z. Kunda, Exaggerated self-assessments and the preference for controllable risks. Organ. Behav. Hum. Decis. Process. 59, 410–427 (1994)CrossRef
47.
go back to reference L.F. Nordgren, J. Van Der Pligt, F. Van Harreveld, Unpacking perceived control in risk perception: the mediating role of anticipated regret. J. Behav. Decis. Mak. 20(5), 533–544 (2007)CrossRef L.F. Nordgren, J. Van Der Pligt, F. Van Harreveld, Unpacking perceived control in risk perception: the mediating role of anticipated regret. J. Behav. Decis. Mak. 20(5), 533–544 (2007)CrossRef
48.
go back to reference L. Brandimarte, A. Acquisti, G. Loewenstein, Misplaced confidences: privacy and the control paradox. Soc. Psychol. Pers. Sci. 4(3), 340–347 (2012)CrossRef L. Brandimarte, A. Acquisti, G. Loewenstein, Misplaced confidences: privacy and the control paradox. Soc. Psychol. Pers. Sci. 4(3), 340–347 (2012)CrossRef
49.
go back to reference J.C. Bertot, P.T. Jaeger, J.M. Grimes, Using ICTs to create a culture of transparency: e-government and social media as openness and anti-corruption tools for societies. Gov. Inf. Q. 27(3), 264–271 (2010)CrossRef J.C. Bertot, P.T. Jaeger, J.M. Grimes, Using ICTs to create a culture of transparency: e-government and social media as openness and anti-corruption tools for societies. Gov. Inf. Q. 27(3), 264–271 (2010)CrossRef
50.
go back to reference J.C. Bertot, P.T. Jaeger, D. Hansen, The impact of polices on government social media use: issues, challenges, and recommendations. Gov. Inf. Q. 29(1), 30–40 (2012)CrossRef J.C. Bertot, P.T. Jaeger, D. Hansen, The impact of polices on government social media use: issues, challenges, and recommendations. Gov. Inf. Q. 29(1), 30–40 (2012)CrossRef
51.
go back to reference E. Christofides, A. Muise, S. Desmarais, Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? CyberPsychol. Behav. 12(3), 341–345 (2012)CrossRef E. Christofides, A. Muise, S. Desmarais, Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? CyberPsychol. Behav. 12(3), 341–345 (2012)CrossRef
53.
go back to reference R. Gross, A. Acquisti, Information revelation and privacy in online social networks, in Proceedings of the ACM Workshop on Privacy in the Electronic Society (ACM, Virginia, USA, 2005), pp. 71–80 R. Gross, A. Acquisti, Information revelation and privacy in online social networks, in Proceedings of the ACM Workshop on Privacy in the Electronic Society (ACM, Virginia, USA, 2005), pp. 71–80
54.
go back to reference H.J. Smith, T. Dinev, H. Xu, Information privacy research: an interdisciplinary review. MIS Q. 35(4), 989–1015 (2011)CrossRef H.J. Smith, T. Dinev, H. Xu, Information privacy research: an interdisciplinary review. MIS Q. 35(4), 989–1015 (2011)CrossRef
55.
go back to reference Y.M. Baek, E. Kim, Y. Bae, My privacy is okay, but theirs is endangered: why comparative optimism matters in online privacy concerns. Comput. Hum. Behav. 31, 48–56 (2014)CrossRef Y.M. Baek, E. Kim, Y. Bae, My privacy is okay, but theirs is endangered: why comparative optimism matters in online privacy concerns. Comput. Hum. Behav. 31, 48–56 (2014)CrossRef
56.
go back to reference E. Hargittai, An update on survey measures of web-oriented digital literacy. Soc. Sci. Comput. Rev. 27(1), 130–137 (2009)CrossRef E. Hargittai, An update on survey measures of web-oriented digital literacy. Soc. Sci. Comput. Rev. 27(1), 130–137 (2009)CrossRef
57.
go back to reference Y.J. Park, Digital literacy and privacy behavior online. Commun. Res. 40(2), 215–236 (2011)CrossRef Y.J. Park, Digital literacy and privacy behavior online. Commun. Res. 40(2), 215–236 (2011)CrossRef
58.
go back to reference B. Debatin, J.P. Lovejoy, A.K. Horn, B.N. Hughes, Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput. Med. Commun. 15, 83–108 (2009)CrossRef B. Debatin, J.P. Lovejoy, A.K. Horn, B.N. Hughes, Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput. Med. Commun. 15, 83–108 (2009)CrossRef
59.
go back to reference B. Debatin, Ethics, privacy, and self-restraint in social networking, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 47–60CrossRef B. Debatin, Ethics, privacy, and self-restraint in social networking, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 47–60CrossRef
60.
go back to reference S. Trepte, D. Teutsch, P.K. Masur, C. Eicher, M. Fischer, A. Hennhofer, F. Lind, Do people know about privacy and data protection strategies? Towards the “Online Privacy Literacy Scale” (OPLIS), in Reforming European Data Protection Law, ed. by S. Gutwirth, R. Leenes, P. Hert (Springer, Heidelberg, 2015), pp. 333–365CrossRef S. Trepte, D. Teutsch, P.K. Masur, C. Eicher, M. Fischer, A. Hennhofer, F. Lind, Do people know about privacy and data protection strategies? Towards the “Online Privacy Literacy Scale” (OPLIS), in Reforming European Data Protection Law, ed. by S. Gutwirth, R. Leenes, P. Hert (Springer, Heidelberg, 2015), pp. 333–365CrossRef
61.
go back to reference T. Zhou, Understanding online community user participation: a social influence perspective”. Internet Res. 21(1), 67–81 (2011)CrossRef T. Zhou, Understanding online community user participation: a social influence perspective”. Internet Res. 21(1), 67–81 (2011)CrossRef
62.
go back to reference C. Posey, P.B. Lowry, T.L. Roberts, T.S. Ellis, Proposing the online community self- disclosure model: the case of working professionals in France and the UK who use online communities. Eur. J. Inf. Syst. 19(2), 181–195 (2010)CrossRef C. Posey, P.B. Lowry, T.L. Roberts, T.S. Ellis, Proposing the online community self- disclosure model: the case of working professionals in France and the UK who use online communities. Eur. J. Inf. Syst. 19(2), 181–195 (2010)CrossRef
64.
go back to reference Z. Tufekci, Facebook, youth and privacy in networked publics, in Proceedings of the Sixth International Conference on Weblogs and Social Media (AAAI org, Dublin, Ireland, 2012), pp. 338–35 Z. Tufekci, Facebook, youth and privacy in networked publics, in Proceedings of the Sixth International Conference on Weblogs and Social Media (AAAI org, Dublin, Ireland, 2012), pp. 338–35
65.
go back to reference M. Ragnedda, Social control and surveillance in the society of consumers. Int. J. Sociol. Anthropol. 3(6), 180–188 (2011) M. Ragnedda, Social control and surveillance in the society of consumers. Int. J. Sociol. Anthropol. 3(6), 180–188 (2011)
66.
go back to reference N.B. Ellison, C. Steinfield, C. Lampe, The benefits of Facebook ‘‘friends’’: social capital and college students’ use of online social network sites. J. Comput.-Mediat. Commun. 12(4), 1143–1168 (2007)CrossRef N.B. Ellison, C. Steinfield, C. Lampe, The benefits of Facebook ‘‘friends’’: social capital and college students’ use of online social network sites. J. Comput.-Mediat. Commun. 12(4), 1143–1168 (2007)CrossRef
67.
go back to reference M. Taddicken, C. Jers, The uses of privacy online: trading a loss of privacy for social web gratifications?, in Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 143–158CrossRef M. Taddicken, C. Jers, The uses of privacy online: trading a loss of privacy for social web gratifications?, in Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 143–158CrossRef
68.
go back to reference S. Trepte, L. Reinecke, The reciprocal effects of social network site use and the disposition for self-disclosure: a longitudinal study. Comput. Hum. Behav. 29(3), 1102–1112 (2013)CrossRef S. Trepte, L. Reinecke, The reciprocal effects of social network site use and the disposition for self-disclosure: a longitudinal study. Comput. Hum. Behav. 29(3), 1102–1112 (2013)CrossRef
69.
go back to reference C.M.K. Cheung, P.-Y. Chiu, M.K.O. Lee, Online social networks: why do students use Facebook? Comput. Hum. Behav. 27(4), 1337–1343 (2011)CrossRef C.M.K. Cheung, P.-Y. Chiu, M.K.O. Lee, Online social networks: why do students use Facebook? Comput. Hum. Behav. 27(4), 1337–1343 (2011)CrossRef
71.
go back to reference D. Boyd, J. Heer, Profiles as conversation: networked identity performance on Friendster, in Proceedings of the Hawai'i International Conference on System Sciences (HICSS-39) (IEEE, Kauai, 2006) D. Boyd, J. Heer, Profiles as conversation: networked identity performance on Friendster, in Proceedings of the Hawai'i International Conference on System Sciences (HICSS-39) (IEEE, Kauai, 2006)
72.
go back to reference C. Steinfield, N. Ellison, C. Lampe, J. Vitak, Online social network sites and the concept of social capital, in Frontiers in New Media Research, ed. by F.L. Lee, L. Leung, J.S. Qiu, D. Chu (Routledge, New York, 2012), pp. 115–131 C. Steinfield, N. Ellison, C. Lampe, J. Vitak, Online social network sites and the concept of social capital, in Frontiers in New Media Research, ed. by F.L. Lee, L. Leung, J.S. Qiu, D. Chu (Routledge, New York, 2012), pp. 115–131
73.
go back to reference P.M. Valkenburg, J. Peter, The effect of instant messaging on the quality of adolescents’ existing friendships: a longitudinal study. J. Commun. 59, 79–97 (2009)CrossRef P.M. Valkenburg, J. Peter, The effect of instant messaging on the quality of adolescents’ existing friendships: a longitudinal study. J. Commun. 59, 79–97 (2009)CrossRef
74.
go back to reference Z.J. Jiang, C.S. Heng, B.C. Choi, Research note-privacy concerns and privacy-protective behavior in synchronous online social interactions. Inform. Syst. Res. 24(3), 579–595 (2013)CrossRef Z.J. Jiang, C.S. Heng, B.C. Choi, Research note-privacy concerns and privacy-protective behavior in synchronous online social interactions. Inform. Syst. Res. 24(3), 579–595 (2013)CrossRef
75.
go back to reference H. Xu, X.R. Luo, J.M. Carroll, M.B. Rosson, The personalization privacy paradox: an exploratory study of decision-making process for location-aware marketing. Decis. Support Syst. 51(1), 42–52 (2011)CrossRef H. Xu, X.R. Luo, J.M. Carroll, M.B. Rosson, The personalization privacy paradox: an exploratory study of decision-making process for location-aware marketing. Decis. Support Syst. 51(1), 42–52 (2011)CrossRef
76.
go back to reference E.E. Hollenbaugh, A.L. Ferris, Facebook self-disclosure: examining the role of traits, social cohesion, and motives. Comput. Hum. Behav. 30, 50–58 (2014)CrossRef E.E. Hollenbaugh, A.L. Ferris, Facebook self-disclosure: examining the role of traits, social cohesion, and motives. Comput. Hum. Behav. 30, 50–58 (2014)CrossRef
77.
go back to reference N.K. Malhotra, S.S. Kim, J. Agarwal, Ιnternet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inform. Syst. Res. 15(4), 336–355 (2004)CrossRef N.K. Malhotra, S.S. Kim, J. Agarwal, Ιnternet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inform. Syst. Res. 15(4), 336–355 (2004)CrossRef
78.
go back to reference M. Sideri, A. Kitsiou, C. Kalloniatis, S. Gritzalis, Privacy and Facebook universities students’ communities for confessions and secrets: the greek case, in e-Democracy 2015. CCIS, vol. 570, ed. by S.K. Katsikas, A.B. Sideridis (Springer, Cham, 2015), pp. 77–94 M. Sideri, A. Kitsiou, C. Kalloniatis, S. Gritzalis, Privacy and Facebook universities students’ communities for confessions and secrets: the greek case, in e-Democracy 2015. CCIS, vol. 570, ed. by S.K. Katsikas, A.B. Sideridis (Springer, Cham, 2015), pp. 77–94
79.
go back to reference F. Stutzman, R. Gross, A. Acquisti, Silent listeners: the evolution of privacy and disclosure on facebook. J. Priv. Confid. 4(2), 7–41 (2013) F. Stutzman, R. Gross, A. Acquisti, Silent listeners: the evolution of privacy and disclosure on facebook. J. Priv. Confid. 4(2), 7–41 (2013)
80.
go back to reference J.L. Gibbs, N.B. Ellison, C.-H. Lai, First comes love, then comes Google: an investigation of uncertainty reduction strategies and self-disclosure in online dating. Commun. Res. 38(1), 70–100 (2011)CrossRef J.L. Gibbs, N.B. Ellison, C.-H. Lai, First comes love, then comes Google: an investigation of uncertainty reduction strategies and self-disclosure in online dating. Commun. Res. 38(1), 70–100 (2011)CrossRef
81.
go back to reference B.M. Okdie, Blogging and self-disclosure: the role of anonymity, self-awareness and audience size. Ph.D. dissertation. Department of Psychology in the Graduate School, University of Alabama, 2011 B.M. Okdie, Blogging and self-disclosure: the role of anonymity, self-awareness and audience size. Ph.D. dissertation. Department of Psychology in the Graduate School, University of Alabama, 2011
82.
go back to reference Z. Papacharissi, P.L. Gibson, Fifteen minutes of privacy: privacy, sociality, and publicity on social network sites, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 75–89CrossRef Z. Papacharissi, P.L. Gibson, Fifteen minutes of privacy: privacy, sociality, and publicity on social network sites, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 75–89CrossRef
83.
go back to reference P.A. Norberg, D. Horne, D. Horne, The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100–126 (2007)CrossRef P.A. Norberg, D. Horne, D. Horne, The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100–126 (2007)CrossRef
84.
go back to reference Z. Tufekci, Can you see me now? Audience and disclosure regulation in online social network sites. Bull. Sci. Technol. Soc. 28, 20–36 (2008)CrossRef Z. Tufekci, Can you see me now? Audience and disclosure regulation in online social network sites. Bull. Sci. Technol. Soc. 28, 20–36 (2008)CrossRef
85.
go back to reference T. Alashoor, M. Keil, L. Liu, H.J. Smith, How values shape concerns about privacy for self and others, in Proceedings of the Thirty Sixth International Conference on Information Systems, ICIS 2015, ed. by T. Carte, A. Heinzl, C. Urquhart (AIS Electronic Library, Atlanta, 2015) T. Alashoor, M. Keil, L. Liu, H.J. Smith, How values shape concerns about privacy for self and others, in Proceedings of the Thirty Sixth International Conference on Information Systems, ICIS 2015, ed. by T. Carte, A. Heinzl, C. Urquhart (AIS Electronic Library, Atlanta, 2015)
86.
go back to reference H. Krasnova, N.F. Veltri, O. Günther, Self-disclosure and privacy calculus on social networking sites: the role of culture: intercultural dynamics of privacy calculus. Bus. Inf. Syst. Eng. 4(3), 127–135 (2012)CrossRef H. Krasnova, N.F. Veltri, O. Günther, Self-disclosure and privacy calculus on social networking sites: the role of culture: intercultural dynamics of privacy calculus. Bus. Inf. Syst. Eng. 4(3), 127–135 (2012)CrossRef
87.
go back to reference P.B. Lowry, J. Cao, A. Everard, Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures. J. Manag. Inf. Syst. 27(4), 163–200 (2011)CrossRef P.B. Lowry, J. Cao, A. Everard, Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures. J. Manag. Inf. Syst. 27(4), 163–200 (2011)CrossRef
88.
go back to reference M. Helweg-Larsen, J.A. Shepperd, Do moderators of the optimistic bias affect personal or target risk estimates? A review of the literature. Pers. Soc. Psychol. Bull. 5(1), 75–95 (2001) M. Helweg-Larsen, J.A. Shepperd, Do moderators of the optimistic bias affect personal or target risk estimates? A review of the literature. Pers. Soc. Psychol. Bull. 5(1), 75–95 (2001)
89.
go back to reference C.M. Hoadley, H. Xu, J.J. Lee, M.B. Rosson, Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron. Commer. Res. Appl. 9(1), 50–60 (2010)CrossRef C.M. Hoadley, H. Xu, J.J. Lee, M.B. Rosson, Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron. Commer. Res. Appl. 9(1), 50–60 (2010)CrossRef
90.
go back to reference A. Acquisti, L.K. John, G. Loewenstein, What is privacy worth? J. Leg. Stud. 42(2), 249–274 (2013)CrossRef A. Acquisti, L.K. John, G. Loewenstein, What is privacy worth? J. Leg. Stud. 42(2), 249–274 (2013)CrossRef
91.
go back to reference K.-L. Hui, H.-H. Teo, S.-Y.T. Lee, The value of privacy assurance: an exploratory field experiment. MIS Q. 31(1), 19–33 (2007)CrossRef K.-L. Hui, H.-H. Teo, S.-Y.T. Lee, The value of privacy assurance: an exploratory field experiment. MIS Q. 31(1), 19–33 (2007)CrossRef
94.
go back to reference S. Livingston, Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media Soc. 10(3), 393–411 (2008)CrossRef S. Livingston, Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media Soc. 10(3), 393–411 (2008)CrossRef
96.
go back to reference P.B. Brandtzæg, M. Lüders, J.H. Skjetne, Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. Int. J. Hum.-Comput. Interact. 26, 1006–1030 (2010)CrossRef P.B. Brandtzæg, M. Lüders, J.H. Skjetne, Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. Int. J. Hum.-Comput. Interact. 26, 1006–1030 (2010)CrossRef
97.
go back to reference E. Van den Broeck, K. Poels, M. Walrave, Older and wiser? Facebook use, privacy concern, and privacy protection in the life stages of emerging, young, and middle adulthood. Soc. Media Soc. 1–11 (2015) E. Van den Broeck, K. Poels, M. Walrave, Older and wiser? Facebook use, privacy concern, and privacy protection in the life stages of emerging, young, and middle adulthood. Soc. Media Soc. 1–11 (2015)
98.
go back to reference K. Sheehan, An investigation of gender differences in on-line privacy concerns and resultant behavior. J. Interact. Mark. 13, 24–38 (1999)CrossRef K. Sheehan, An investigation of gender differences in on-line privacy concerns and resultant behavior. J. Interact. Mark. 13, 24–38 (1999)CrossRef
99.
go back to reference C. Jensen, C. Potts, C. Jensen, Privacy practices of Internet users: Self-reports versus observed behavior. Int. J. Hum. Comput. Stud. 63(1–2), 203–227 (2005)CrossRef C. Jensen, C. Potts, C. Jensen, Privacy practices of Internet users: Self-reports versus observed behavior. Int. J. Hum. Comput. Stud. 63(1–2), 203–227 (2005)CrossRef
100.
go back to reference M.S. Ackerman, L.F. Cranor, J. Reagle, Privacy in e-commerce: examining user scenarios and privacy preferences, in Proceedings of the ACM Conference on Electronic Commerce (ACM, Denver, U.S.A, 1999), pp. 1–8 M.S. Ackerman, L.F. Cranor, J. Reagle, Privacy in e-commerce: examining user scenarios and privacy preferences, in Proceedings of the ACM Conference on Electronic Commerce (ACM, Denver, U.S.A, 1999), pp. 1–8
101.
go back to reference K.B. Sheehan, Toward a typology of Internet users and online privacy concerns. Inf. Soc. 18, 21–32 (2002)CrossRef K.B. Sheehan, Toward a typology of Internet users and online privacy concerns. Inf. Soc. 18, 21–32 (2002)CrossRef
102.
go back to reference M.Z. Yao, R.E. Rice, K. Wallis, Predicting user concerns about online privacy. J. Am. Soc. Inf. Sci. Technol. 58, 710–722 (2007)CrossRef M.Z. Yao, R.E. Rice, K. Wallis, Predicting user concerns about online privacy. J. Am. Soc. Inf. Sci. Technol. 58, 710–722 (2007)CrossRef
103.
go back to reference Y. Feng, W. Xie, Teens’ concern for privacy when using social networking sites: an analysis of socialization agents and relationships with privacy-protecting behaviors. Comput. Hum. Behav. 33, 153–162 (2014)CrossRef Y. Feng, W. Xie, Teens’ concern for privacy when using social networking sites: an analysis of socialization agents and relationships with privacy-protecting behaviors. Comput. Hum. Behav. 33, 153–162 (2014)CrossRef
104.
go back to reference G. Cecere, F. Le Guel, N. Soulié, Perceived Internet privacy concerns on social networks in Europe. Technol. Forecast. Soc. Chang. 96, 277–287 (2015)CrossRef G. Cecere, F. Le Guel, N. Soulié, Perceived Internet privacy concerns on social networks in Europe. Technol. Forecast. Soc. Chang. 96, 277–287 (2015)CrossRef
105.
go back to reference D.H. Nguyen, E.D. Mynatt, Privacy Mirrors: Understanding and Shaping Socio-Technical Ubiquitous Computing Systems (Georgia Institute of Technology, USA, 2002) D.H. Nguyen, E.D. Mynatt, Privacy Mirrors: Understanding and Shaping Socio-Technical Ubiquitous Computing Systems (Georgia Institute of Technology, USA, 2002)
106.
go back to reference E. Kavakli, C. Kalloniatis, P. Loucopoulos, S. Gritzalis, Incorporating privacy requirements into the system design process: the PriS conceptual framework. Internet Res. 16(2), 140–158 (2006)CrossRef E. Kavakli, C. Kalloniatis, P. Loucopoulos, S. Gritzalis, Incorporating privacy requirements into the system design process: the PriS conceptual framework. Internet Res. 16(2), 140–158 (2006)CrossRef
107.
go back to reference C. Kalloniatis, E. Kavakli, S. Gritzalis, PriS methodology: incorporating privacy requirements into the system design process, in Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference—Symposium on Requirements Engineering for Information Security, ed. by J. Mylopoulos, G. Spafford (IEEE, France, Paris, 2005), pp. 1–9 C. Kalloniatis, E. Kavakli, S. Gritzalis, PriS methodology: incorporating privacy requirements into the system design process, in Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering ConferenceSymposium on Requirements Engineering for Information Security, ed. by J. Mylopoulos, G. Spafford (IEEE, France, Paris, 2005), pp. 1–9
108.
go back to reference C. Kalloniatis, E. Kavakli, S. Gritzalis, Addressing privacy requirements in system design: the PriS method. Requir. Eng. J. 13(3), 241–255 (2008)CrossRef C. Kalloniatis, E. Kavakli, S. Gritzalis, Addressing privacy requirements in system design: the PriS method. Requir. Eng. J. 13(3), 241–255 (2008)CrossRef
109.
go back to reference M. Pavlidis, H. Mouratidis, C. Kalloniatis, S. Islam, S. Gritzalis, Trustworthy selection of cloud providers based in security and privacy requirements: justifying trust assumptions, in Proceedings of 10th International Conference on Trust, Privacy and Security in Digital Business, ed. by S. Furnell, C. Lambrinoudakis (Springer, Czech, Prague, 2013), pp. 185–198 M. Pavlidis, H. Mouratidis, C. Kalloniatis, S. Islam, S. Gritzalis, Trustworthy selection of cloud providers based in security and privacy requirements: justifying trust assumptions, in Proceedings of 10th International Conference on Trust, Privacy and Security in Digital Business, ed. by S. Furnell, C. Lambrinoudakis (Springer, Czech, Prague, 2013), pp. 185–198
110.
go back to reference N.C. Kramer, N. Haferkamp, Online self-presentation: balancing privacy concerns and impression construction on social networking sites, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 127–141CrossRef N.C. Kramer, N. Haferkamp, Online self-presentation: balancing privacy concerns and impression construction on social networking sites, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 127–141CrossRef
111.
go back to reference E. Litt, Understanding social network site users' privacy tool use. Comput. Hum. Behav. 29, 1649–1656 (2013)CrossRef E. Litt, Understanding social network site users' privacy tool use. Comput. Hum. Behav. 29, 1649–1656 (2013)CrossRef
112.
go back to reference A.L. Young, A. Quan-Haase, Privacy protection strategies on Facebook. Information. Commun. Soc. 16(4), 479–500 (2013)CrossRef A.L. Young, A. Quan-Haase, Privacy protection strategies on Facebook. Information. Commun. Soc. 16(4), 479–500 (2013)CrossRef
113.
go back to reference M. Johnson, S. Egelman, S.M. Bellovin, Facebook and privacy: it’s complicated, in Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS 2012) (ACM, Washington, 2012), pp. 1–15 M. Johnson, S. Egelman, S.M. Bellovin, Facebook and privacy: it’s complicated, in Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS 2012) (ACM, Washington, 2012), pp. 1–15
114.
go back to reference E. Vanderhoven, T. Schellens, M. Valcke, Exploring the usefulness of school education about risks on social network sites: a survey study. J. Media Liter. Educ. 5(1), 285–294 (2013) E. Vanderhoven, T. Schellens, M. Valcke, Exploring the usefulness of school education about risks on social network sites: a survey study. J. Media Liter. Educ. 5(1), 285–294 (2013)
115.
go back to reference E. Vanderhoven, T. Schellens, M. Valcke, Educating teens about the risks on social network sites: an intervention study in secondary education. Communicar Sci. J. Media Educ. 43(XXII), 123–131 (2014) E. Vanderhoven, T. Schellens, M. Valcke, Educating teens about the risks on social network sites: an intervention study in secondary education. Communicar Sci. J. Media Educ. 43(XXII), 123–131 (2014)
116.
go back to reference E. Vanderhoven, T. Schellens, R. Vanderlinde, M. Valcke, Developing educational materials about risks on social network sites: a design-based research approach. Educ. Tech. Res. Dev. 64, 459–480 (2016)CrossRef E. Vanderhoven, T. Schellens, R. Vanderlinde, M. Valcke, Developing educational materials about risks on social network sites: a design-based research approach. Educ. Tech. Res. Dev. 64, 459–480 (2016)CrossRef
117.
go back to reference R. Del Rey, J.A. Casas, R. Ortega, The ConRed program, an evidence-based practice. Communicar Sci. J. Media Educ. 39(XX), 129–137 (2012) R. Del Rey, J.A. Casas, R. Ortega, The ConRed program, an evidence-based practice. Communicar Sci. J. Media Educ. 39(XX), 129–137 (2012)
118.
go back to reference M. Sideri, A. Kitsiou, E. Tzortzaki, C. Kalloniatis, S. Gritzalis, “I have learned that I must think twice before…”. An educational intervention for enhancing students’ privacy awareness in Facebook, in Proceedings of the 7th International Conference, E-Democracy 2017, ed. by S. Katsikas, V. Zorkadis (Springer, Cham, 2017), pp. 79–94 M. Sideri, A. Kitsiou, E. Tzortzaki, C. Kalloniatis, S. Gritzalis, “I have learned that I must think twice before…”. An educational intervention for enhancing students’ privacy awareness in Facebook, in Proceedings of the 7th International Conference, E-Democracy 2017, ed. by S. Katsikas, V. Zorkadis (Springer, Cham, 2017), pp. 79–94
119.
go back to reference M. Foucault, Power, Knowledge Ethics (Ipsilon, Athens, 1987). (in Greek) M. Foucault, Power, Knowledge Ethics (Ipsilon, Athens, 1987). (in Greek)
120.
go back to reference T.H. Eriksen, Tyranny of the Moment Fast and Slow Time in the Information Age (. Pluto Press, London, 2001) T.H. Eriksen, Tyranny of the Moment Fast and Slow Time in the Information Age (. Pluto Press, London, 2001)
121.
go back to reference Μ. Jakala, E. Berki, Communities, communication and online identities, in Digital Identity and Social Media, ed. by St. Warburton, St. Hatzipanagos (IGI Global, USA, 2013), pp. 1–13 Μ. Jakala, E. Berki, Communities, communication and online identities, in Digital Identity and Social Media, ed. by St. Warburton, St. Hatzipanagos (IGI Global, USA, 2013), pp. 1–13
122.
go back to reference E. Lampropoulou, Internal Security and Control Society (Kritiki Publ, Athens, 2001). (in Greek) E. Lampropoulou, Internal Security and Control Society (Kritiki Publ, Athens, 2001). (in Greek)
123.
go back to reference C. Norris, From personal to digital: CCTV, the panopticon and the technological mediation of suspicion and social control, in Surveillance and Social Sorting: Privacy Risk and Automated Discrimination, ed. by D. Lyon (Routledge, London, 2003), pp. 249–281 C. Norris, From personal to digital: CCTV, the panopticon and the technological mediation of suspicion and social control, in Surveillance and Social Sorting: Privacy Risk and Automated Discrimination, ed. by D. Lyon (Routledge, London, 2003), pp. 249–281
124.
go back to reference D. Lyon, The Electronic Eye: The Rise of Surveillance Society-Computers and Social Control in Context (Wiley, UK, 2013) D. Lyon, The Electronic Eye: The Rise of Surveillance Society-Computers and Social Control in Context (Wiley, UK, 2013)
125.
go back to reference M. Kandias, L. Mitrou, V. Stavrou, D. Gritzalis, Which side are you on? A new panopticon versus privacy, in Proceedings of 2013 International Conference on Security and Cryptography (SECRYPT) (IEEE, Reykjavik, Iceland, 2013), pp. 1–13 M. Kandias, L. Mitrou, V. Stavrou, D. Gritzalis, Which side are you on? A new panopticon versus privacy, in Proceedings of 2013 International Conference on Security and Cryptography (SECRYPT) (IEEE, Reykjavik, Iceland, 2013), pp. 1–13
126.
go back to reference L. Mitrou, M. Kandias, V. Stavrou, D. Gritzalis, Social media profiling: a panopticon or omniopticon tool? in Proceedings of the 6th Biannual Surveillance and Society Conference (Spain, Barcelona, 2014), pp. 1–15 L. Mitrou, M. Kandias, V. Stavrou, D. Gritzalis, Social media profiling: a panopticon or omniopticon tool? in Proceedings of the 6th Biannual Surveillance and Society Conference (Spain, Barcelona, 2014), pp. 1–15
127.
go back to reference A. Melucci, Social Theory in the Information Era (Trotta Editorial, 2002) A. Melucci, Social Theory in the Information Era (Trotta Editorial, 2002)
128.
go back to reference E. Daskalakis, Criminology of Social Reaction: Traditions (Sakkoulas Publ, Athens, 1985). (in Greek) E. Daskalakis, Criminology of Social Reaction: Traditions (Sakkoulas Publ, Athens, 1985). (in Greek)
129.
go back to reference F.B. Viégas, Blogger’s expectations of privacy and accountability: an initial survey. J. Comput.-Mediated Commun. 10(3), 1–31 (2005) F.B. Viégas, Blogger’s expectations of privacy and accountability: an initial survey. J. Comput.-Mediated Commun. 10(3), 1–31 (2005)
130.
go back to reference G. D’Souza, J.E. Phelps, The privacy Paradox: the case of secondary disclosure. Rev. Mark. Sci. 7, 1–29 (2009) G. D’Souza, J.E. Phelps, The privacy Paradox: the case of secondary disclosure. Rev. Mark. Sci. 7, 1–29 (2009)
131.
go back to reference D.J. Solove, A taxonomy of privacy. Law Rev. 154(3), 477–560 (2006) D.J. Solove, A taxonomy of privacy. Law Rev. 154(3), 477–560 (2006)
132.
go back to reference M.B. Islam, J. Watson, R. Iannella, S. Geva, What I Want for my Social Network Privacy (NICTA, Australia, 2014) M.B. Islam, J. Watson, R. Iannella, S. Geva, What I Want for my Social Network Privacy (NICTA, Australia, 2014)
133.
go back to reference A. Beldad, M. De Jong, M. Steehouder, I trust not therefore it must be risky: determinants of the perceived risks of disclosing personal data for e-government transactions. Comput. Hum. Behav. 27(6), 2233–2242 (2011)CrossRef A. Beldad, M. De Jong, M. Steehouder, I trust not therefore it must be risky: determinants of the perceived risks of disclosing personal data for e-government transactions. Comput. Hum. Behav. 27(6), 2233–2242 (2011)CrossRef
134.
go back to reference J. Midgley, Social Development The Developmental Perspective in Social Welfare (Sage, London, 1995) J. Midgley, Social Development The Developmental Perspective in Social Welfare (Sage, London, 1995)
135.
go back to reference J. Holmberg (ed.), Making Development Sustainable (Island Press, Washington D.C., 1992) J. Holmberg (ed.), Making Development Sustainable (Island Press, Washington D.C., 1992)
136.
go back to reference W. Streeck, Productive constraints: on the institutional conditions of diversified quality production, in Social Institutions and Economic Performance, ed. by W. Street (Sage, London, 1992), pp. 1–40 W. Streeck, Productive constraints: on the institutional conditions of diversified quality production, in Social Institutions and Economic Performance, ed. by W. Street (Sage, London, 1992), pp. 1–40
137.
go back to reference P. Cooke, K. Morgan, The Associational Economy (Oxford University Press, Oxford, 1998)CrossRef P. Cooke, K. Morgan, The Associational Economy (Oxford University Press, Oxford, 1998)CrossRef
138.
go back to reference N. Uphoff, Local Institutional Development: An Analytic Sourcebook with Cases (Kumarian, West Hartford, 1986) N. Uphoff, Local Institutional Development: An Analytic Sourcebook with Cases (Kumarian, West Hartford, 1986)
139.
go back to reference L.F. Salmen, Listen to the People Participant-Observer Evaluation of Development Projects (Oxford University Press, Washington, 1987) L.F. Salmen, Listen to the People Participant-Observer Evaluation of Development Projects (Oxford University Press, Washington, 1987)
140.
go back to reference S.E. Henderson, Expectations of privacy in social media. Mississippi Coll. Law Rev. 31, 227–324 (2012) S.E. Henderson, Expectations of privacy in social media. Mississippi Coll. Law Rev. 31, 227–324 (2012)
141.
go back to reference J.E. Cohen, What privacy is for. Harvard Law Rev. 126(7), 1904–1933 (2013) J.E. Cohen, What privacy is for. Harvard Law Rev. 126(7), 1904–1933 (2013)
Metadata
Title
Sustaining Social Cohesion in Information and Knowledge Society: The Priceless Value of Privacy
Authors
Stefanos Gritzalis
Maria Sideri
Angeliki Kitsiou
Eleni Tzortzaki
Christos Kalloniatis
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-41196-1_9

Premium Partners