Social Network Privacy Models
A Systematic Literature Review and Directions for Further Research
Privacy is a vital research field for social network (SN) sites (SNS), such as Facebook, Twitter, and Google+, where both the number of users and the number of SN applications are sharply growing. Recently, there has been an exponential increase in user-generated text content, mainly in terms of posts, tweets, reviews, and messages on SN. This increase in textual information introduces many problems related to privacy. Privacy is susceptible to personal behavior due to the shared online data structure of SNS. Therefore, this study will conduct a systematic literature review to identify and discuss the main privacy issues associated with SN, existing privacy models and the limitations and gaps in current research into SN privacy.
D. Gritzalis, M. Kandias, V. Stavrou and L. Mitrou. “History of information: The case of privacy and security in social media”. Proceeding of the History of Information Conference. pp. 283-310, 2014.
H. Zhu, C. Huang, R. Lu and H. Li. “Modelling information dissemination under privacy concerns in social media”. Physica A: Statistical Mechanics and its Applications, vol. 449, pp. 53-63, 2016.
N. B. Ellison and D. M. Boyd. “Social network sites: Definition, history, and scholarship”. Journal of Computer-Mediated Communication, vol. 13, pp. 210-230, 2007.
P. M. Leonardi, M. Huysman and C. Steinfield. “Enterprise social media: Definition, history, and prospects for the study of social technologies in organizations”. Journal of Computer-Mediated Communication, vol. 19, pp. 1-19, 2013.
T. K. Yu and G. S. Wu. “Determinants of internet shopping behavior: An application of reasoned behaviour theory”. International Journal of Management, vol. 24, p. 744, 2007.
A. Croitoru., A. Crooks, J. Radzikowski and A. Stefanidis. “Geosocial gauge: A system prototype for knowledge discovery from social media”. International Journal of Geographical Information Science, vol. 27, pp. 2483-2508, 2013.
M. Hajli. “A research framework for social commerce adoption”. Information Management and Computer Security, vol. 21, pp. 144154, 2013.
J. H. Abawajy, M. I. H. Ninggal and T. Herawan. “Privacy preserving social network data publication”. IEEE communications Surveys and Tutorials, vol. 18, pp. 1974-1997, 2016.
C. C. Aggarwal and H. Wang, H. “Text mining in Social Networks”. In: Social Network Data Analytics. Springer, Berlin, Germany. pp. 353-378, 2011.
. N. N. Bazarova and Y. H. Choi. “Self-disclosure in social media: Extending the functional approach to disclosure motivations and characteristics on social network sites”. Journal of Communication, vol. 64, pp. 635-657, 2014.
L. Gitelman. “Always already new”. In: Media, History, and the Data of Culture. The MIT Press, Cambridge. P. 7, 2006.
J. Webster and R. T. Watson. “Analyzing the past to prepare for the future: Writing a literature review”. MIS Quarterly, vol. 26, no. 2, pp. 13-23, 2002.
P. Brereton, B. A. Kitchenham, D. Budgen, M. Turner and M. Khalil. “Lessons from applying the systematic literature review process within the software engineering domain”. Journal of Systems and Software, vol. 80, pp. 571-583, 2007.
M. Shanmugam and Y. Y. Jusoh. “Social Commerce from the Information Systems Perspective: A Systematic Literature Review”. Computer and Information Sciences (ICCOINS), 2014 International Conference. IEEE. pp. 1-6, 2014.
Y. Levy and T. J. Ellis. “A systems approach to conduct an effective literature review in support of information systems research”. Informing Science: The International Journal of an Emerging Transdiscipline, vol. 9, pp. 181-212, 2006.
W. Bandara, S. Miskon and E. Fielt. “A Systematic, Tool-supported Method for Conducting Literature Reviews in Information Systems”. Proceedings of the19th European Conference on Information Systems (ECIS 2011), 2011.
B. Kitchenham, D. Budgen, P. Brereton, M. Turner, S. Charters and S. Linkman. “Large-scale software engineering questions expert opinion or empirical evidence”? IET Software, vol. 1, pp. 161-171, 2007.
S. Nidhra, M. Yanamadala, W. Afzal and R. Torkar. “Knowledge transfer challenges and mitigation strategies in global software development a systematic literature review and industrial validation”. International Journal of Information Management, vol. 33, pp. 333-355, 2013.
S. Kokolakis. “Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon”. Computers and Security, vol. 64, pp. 122-134, 2017.
S. B. Barnes. “A privacy paradox: Social networking in the United States”. First Monday, vol. 11, pp. ???, 2006.
J. P. Carrascal, C. Riederer, V. Erramilli, M. Cherubini and R. de Oliveira. “Your Browsing Behavior for a Big Mac: Economics of Personal Information Online”. Proceedings of the 22nd International Conference on World Wide Web. ACM. pp. 189-200, 2013.
T. Hughes-Roberts. “Privacy and Social Networks: Is Concern a Valid Indicator of Intention and Behaviour”? Social Computing (SocialCom), 2013 International Conference. IEEE. pp. 909-912, 2013.
K. J. Lee. “Development and Analyses of Privacy Management Models in Online Social Networks based on Communication Privacy Management Theory”. PhD Thesis, Drexel University, 2013.
Y. S. Hau, B. Kim, H. Lee, Y. G. Kim. “The effects of individual motivations and social capital on employees’ tacit and explicit knowledge sharing intentions”. International Journal of Information Management, vol. 33, pp. 356-366, 2013.
B. Reynolds, J. Venkatanathan, J. Gonçalves and V. Kostakos. “Sharing Ephemeral Information in Online Social Networks: Privacy Perceptions and Behaviours”. IFIP Conference on HumanComputer Interaction. Springer, Berlin, pp. 204-215, 2011.
Z. Tufekci. “Can you see me now? Audience and disclosure regulation in online social network sites”. Bulletin of Science, Technology and Society, vol. 28, pp. 20-36, 2008.
M. Taddicken. “The ‘privacy paradox’in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure”. Journal of Computer-Mediated Communication, vol. 19, pp. 248-273, 2014.
A. M. Zafeiropoulou, D. E. Millard, C. Webber and K. O’Hara. “Unpicking the Privacy Paradox: Can Structuration Theory Help to Explain Locations Privacy Decisions. Proceeding of the 5th Annual ACM Web Science Conference. ACM, pp. 463-472, 2013.
Z. Bauman and D. Lyon. “Liquid Surveillance: A Conversation”. John Wiley and Sons, New York, 2013.
J. Grimmelmann. “The privacy virus”. Facebook and Philosophy, vol. 6, pp. 3-12, 2010.
D. C. Locke and D. F. Bailey. “Increasing Multicultural Understanding”. Sage Publications, Thousand Oaks, 2013.
G. Blank, G. Bolsover and E. Dubois. “A New Privacy Paradox: Young People and Privacy on Social Network Sites”. Prepared for the Annual Meeting of the American Sociological Association, 17 August 2014. San Francisco, California, 2014.
C. Lutz and P. Strathoff. “Privacy Concerns and Online Behavior Not so Paradoxical After All? Viewing the Privacy Paradox through Different Theoretical Lenses”. Papers, 2014.
Y. Liu, J. K. Boyles, J. Genzer and M. D. Dickey. “Self-folding of polymer sheets using local light absorption”. Soft Matter, vol. 8, pp. 1764-1769, 2012.
F. J. Pérez-Latre, I. Portilla and C. S. Blanco. “Social networks, media and audiences: A literature review”. Comunicación y Sociedad, vol. 24, p. 63, 2011.
I. Taylor, P. Walton and J. Young. “The New Criminology: For a Social Theory of Deviance”. Routledge, Abingdon, 2013.
D. Boyd, S. Golder and G. Lotan. “Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter. System Sciences (HICSS), 2010. 43rd Hawaii International Conference. IEEE, pp. 1-10, 2010.
E. Christofides, A. Muise and S. Desmarais. “Information disclosure and control on Facebook: Are they two sides of the same coin or two different processes”? Cyberpsychology and Behavior, vol. 12, pp. 341-345, 2009.
O. Nov and S. Wattal. “Social Computing Privacy Concerns: Antecedents and Effects. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, pp. 333-336, 2009.
S. Chai, S. Bagchi-Sen, C. Morrell, H. R. Rao and S. J. Upadhyaya. “Internet and online information privacy: An exploratory study of preteens and early teens”. IEEE Transactions on Professional Communication, vol. 52, pp. 167-182, 2009.
D. H. Shin. “The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption”. Interacting with Computers, vol. 22, pp. 428-438, 2010.
L. Casaló, C. Flavián and M. Guinalíu. “The impact of participation in virtual brand communities on consumer trust and loyalty: The case of free software”. Online Information Review, vol. 31, pp. 775-792, 2007.
D. J. Kim, D. L. Ferrin and H. R. Rao. “A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents”. Decision Support Systems, vol. 44, pp. 544-564, 2008.
T. Dinev and P. Hart. “Internet privacy concerns and their antecedents-measurement validity and a regression model”. Behaviour and Information Technology, vol. 23, pp. 413-422, 2004.
M. Deng, K. Wuyts, R. Scandariato, B. Preneel and W. Joosen. “A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements”. Requirements Engineering, vol. 16, pp. 3-32, 2011.
N. K. Malhotra, S. S. Kim and J. Agarwal. “Internet users” information privacy concerns (IUIPC): The construct, the scale, and a causal model”. Information Systems Research, vol. 15, pp. 336-355, 2004.
C. L. Miltgen and D. Peyrat-Guillard. “Cultural and generational influences on privacy concerns: A qualitative study in seven European countries”. European Journal of Information Systems, vol. 23, pp. 103-125, 2014.
E. Hargittai and D. Boyud. “Facebook privacy settings: Who cares”? First Monday, vol. 15, no. 8, pp. ???, 2010.
A. L. Young and A. Quan-Haase. “Privacy protection strategies on Facebook: The Internet privacy paradox revisited”. Information, Communication and Society, vol. 16, pp. 479-500, 2013.
L. S. Aeschlimann, R. Harasgama, F. Kehr, C. Lutz, V. Milanova, S. Müller, P. Strathoff and A. Tamò. “Re-Setting the Stage for Privacy: A Multi-Layered Privacy Interaction Framework and its Application”. Mensch und Maschine Symbiose oder Parasitismus? Schriften der Assistierenden der Universität St.Gallen, 2014.
L. V. Casalo, C. Flavián and M. Guinalíu. “The role of security, privacy, usability and reputation in the development of online banking”. Online Information Review, vol. 31, pp. 583-603, 2007.
A. J. Kim and E. Ko. “Do social media marketing activities enhance customer equity? An empirical study of luxury fashion brand”. Journal of Business Research, vol. 65, pp. 1480-1486, 2012.
S. Bandyopadhyay, V. Shaw, A. Banerjee and D. Nag. “Social knowledge management: Use of social media for disseminating informal wisdom of elderly to the youth”. International Journal of Knowledge, Innovation and Entrepreneurship, vol. 1, pp. 107-115, 2013.
S. R. Veil, J. Reno, R. Freihaut and J. Oldham. “Online activists vs. Kraft foods: A case of social media hijacking”. Public Relations Review, vol. 41, pp. 103-108, 2015.
M. A. Perales, E. K. Drake, N. Pemmaraju and W. A. Wood. “Social media and the adolescent and young adult (AYA) patient with cancer”. Current Hematologic Malignancy Reports, vol. 11, pp. 449-455, 2016.
E. W. Ngai, S. S. Tao and K. K. Moon. “Social media research: Theories, constructs, and conceptual frameworks”. International Journal of Information Management, vol. 35, pp. 33-44, 2015.
K. Chai, V. Potdar and T. Dillon. “Content Quality Assessment Related Frameworks for Social Media. “International Conference on Computational Science and Its Applications”. Springer, Berlin, pp. 791-805, 2009.
M. Lallmahamood. “An examination of individual’s perceived security and privacy of the internet in Malaysia and the influence of this on their intention to use e-commerce: Using an extension of the technology acceptance model”. Journal of Internet Banking and Commerce, vol. 12, no. 1, pp. ???, 2007.
X. Wang, C. Yu and Y. Wei. “Social media peer communication and impacts on purchase intentions: A consumer socialization framework”. Journal of Interactive Marketing, vol. 26, pp. 198-208, 2012.
Z. Liu, Q. Min, Q. Zhai and R. Smyth. “Self-disclosure in Chinese micro-blogging: A social exchange theory perspective”. Information and Management, vol. 53, pp. 53-63, 2016.
M. E. Keim and E. Noji. “Emergent use of social media: A new age of opportunity for disaster resilience”. American Journal of Disaster Medicine, vol. 6, pp. 47-54, 2011.
A. M. Kaplan and M. Haenlein. “Users of the world, unite! The challenges and opportunities of Social Media”. Business Horizons, vol. 53, pp. 59-68, 2010.
N. Dabbagh and A. Kitsantas. “Personal learning environments, social media, and self-regulated learning: A natural formula for connecting formal and informal learning”. The Internet and Higher Education, vol. 15, pp. 3-8, 2012.
A. Sarker, K. O’Connor, R. Ginn, M. Scotch, K. Smith, D. Malone and G. Gonzalez. “Social media mining for toxicovigilance: Automatic monitoring of prescription medication abuse from Twitter”. Drug Safety, vol. 39, pp. 231-240, 2016.
A. E. Marwick and D. Boyd. “Networked privacy: How teenagers negotiate context in social media”. New Media and Society, vol. 16, pp. 1051-1067, 2014.
Copyright (c) 2019 Abdullah Abdulabbas Nahi Al-Rabeeah, Mohammed Mahdi Hashim
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).