Skip to main content

The Relevance of Privacy Concerns, Trust, and Risk for Hybrid Social Media

  • Conference paper
  • First Online:
Evaluation of Novel Approaches to Software Engineering (ENASE 2021)

Abstract

Users generate a massive amount of personal, partly sensitive data in online social media. In the past, data breaches made evident that service providers of social media lack in adequately protecting this data leading to user concerns in regards to their privacy. Privacy-preserving social media emerged to address this issue by providing more secure environments for private social exchanges. However, these platforms often fall short of attracting users away from conventional social media and establishing users’ trust in them. In this work, we aim to enhance the trustworthiness of privacy-preserving social media, in particular a hybrid social media application. For this purpose, we first analyze the relationships between privacy concerns, trusting beliefs, risk beliefs, and willingness to use. Second, we examine the effect of user characteristics on these relationships. Third, we mitigate privacy concerns via trust-related software features developed with the TrustSoFt method. We conduct a thorough user study to assess the impact of these features on the privacy concerns and trustworthiness. Our findings indicate the special importance of addressing particular privacy concerns, such as “Awareness of Privacy Practices”. Furthermore, results suggest that older individuals as well as individuals that have experience with privacy incidents, are more susceptible to trust-related software features.

A. Borchert and A. Wainakh—Funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) - 251805230/GRK 2050 and 2167.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aiken, L.S., West, S.G., Reno, R.R.: Multiple Regression: Testing and Interpreting Interactions. Sage (1991)

    Google Scholar 

  2. Alisie, M.: Unveiling AKASHA, May 2016. https://akasha.org/blog/2016/05/03/unveiling-akasha. Accessed 21 Mar 2019

  3. Anderson, J.C., Gerbing, D.W.: Structural equation modeling in practice: a review and recommended two-step approach. Psychol. Bull. 103(3), 411 (1988)

    Article  Google Scholar 

  4. Borchert, A., Díaz Ferreyra, N.E., Heisel, M.: Building trustworthiness in computer-mediated introduction: a facet-oriented framework. In: International Conference on Social Media and Society, pp. 39–46 (2020)

    Google Scholar 

  5. Borchert, A., Ferreyra, N.E.D., Heisel, M.: A conceptual method for eliciting trust-related software features for computer-mediated introduction. In: ENASE, pp. 269–280 (2020)

    Google Scholar 

  6. Borchert, A., Wainakh, A., Krämer, N., Mühlhäuser, M., Heisel, M.: Mitigating privacy concerns by developing trust-related software features for a hybrid social media application. In: ENASE, pp. 269–280 (2021)

    Google Scholar 

  7. Büttner, O.B., Göritz, A.S.: Perceived trustworthiness of online shops. J. Consum. Behav.: Int. Res. Rev. 7(1), 35–50 (2008)

    Article  Google Scholar 

  8. Choi, J.P.: Herd behavior, the “penguin effect”, and the suppression of informational diffusion: an analysis of informational externalities and payoff interdependency. Rand J. Econ. 407–425 (1997)

    Google Scholar 

  9. Colquitt, J.A., Scott, B.A., LePine, J.A.: Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. J. Appl. Psychol. 92(4), 909 (2007)

    Article  Google Scholar 

  10. Daubert, J., Bock, L., Kikirasy, P., Mühlhäuser, M., Fischer, M.: Twitterize: anonymous micro-blogging. In: 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), pp. 817–823. IEEE (2014)

    Google Scholar 

  11. Dean, B.: Social network usage & growth statistics: how many people use social media in 2021? (2021). https://backlinko.com/social-media-users. Accessed 24 June 2021

  12. Donath, J.: How social media design shapes society. In: CHI 2014 Extended Abstracts on Human Factors in Computing Systems, pp. 1057–1058 (2014)

    Google Scholar 

  13. Dowling, G.R.: Perceived risk: the concept and its measurement. Psychol. Mark. 3(3), 193–210 (1986)

    Article  Google Scholar 

  14. Ebert, N., Ackermann, K.A., Heinrich, P.: Does context in privacy communication really matter?-A survey on consumer concerns and preferences. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1–11 (2020)

    Google Scholar 

  15. Elliott, A.C., Woodward, W.A.: Statistical Analysis Quick Reference Guidebook: With SPSS Examples. Sage (2007)

    Google Scholar 

  16. Goldfarb, A., Tucker, C.: Shifts in privacy concerns. Am. Econ. Rev. 102(3), 349–53 (2012)

    Article  Google Scholar 

  17. Graffi, K., Podrajanski, S., Mukherjee, P., Kovacevic, A., Steinmetz, R.: A distributed platform for multimedia communities (2008)

    Google Scholar 

  18. Guardian, T.: Facebook to contact 87 million users affected by data breach, April 2018. https://www.theguardian.com/technology/2018/apr/08/facebook-to-contact-the-87-million-users-affected-by-data-breach. Accessed 07 Dec 2020

  19. Guardian, T.: Huge Facebook breach leaves thousands of other apps vulnerable, October 2018. https://www.theguardian.com/technology/2018/oct/02/facebook-hack-compromised-accounts-tokens. Accessed 18 Nov 2020

  20. Hayes, A.F.: Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach. Guilford Publications (2017)

    Google Scholar 

  21. Heirman, W., Walrave, M., Ponnet, K.: Predicting adolescents’ disclosure of personal information in exchange for commercial incentives: an application of an extended theory of planned behavior. Cyberpsychol. Behav. Soc. Netw. 16(2), 81–87 (2013)

    Article  Google Scholar 

  22. Holmes, A.: 533 million Facebook users’ phone numbers and personal data have been leaked online (2021). https://www.businessinsider.com/stolen-data-of-533-million-facebook-users-leaked-online-2021-4?r=US&IR=T. Accessed 24 June 2021

  23. Hu, L.T., Bentler, P.M.: Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Struct. Eqn. Model.: A Multidisc. J. 6(1), 1–55 (1999)

    Article  Google Scholar 

  24. Jarvenpaa, S.L., Tractinsky, N., Saarinen, L.: Consumer trust in an internet store: a cross-cultural validation. J. Comput.-Mediat. Commun. 5(2), JCMC526 (1999)

    Google Scholar 

  25. Jiang, Z., Heng, C.S., Choi, B.C.: Research note-privacy concerns and privacy-protective behavior in synchronous online social interactions. Inf. Syst. Res. 24(3), 579–595 (2013)

    Article  Google Scholar 

  26. Jose, P.E.: Doing Statistical Mediation and Moderation. Guilford Press (2013)

    Google Scholar 

  27. Junco, R.: Comparing actual and self-reported measures of Facebook use. Comput. Hum. Behav. 29(3), 626–631 (2013)

    Article  Google Scholar 

  28. Kani-Zabihi, E., Helmhout, M.: Increasing service users’ privacy awareness by introducing on-line interactive privacy features. In: Laud, P. (ed.) NordSec 2011. LNCS, vol. 7161, pp. 131–148. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29615-4_10

    Chapter  Google Scholar 

  29. Kozlowska, I.: Facebook and data privacy in the age of Cambridge analytica. The University of Washington, Seattle (2018). Accessed 1 Aug 2019

    Google Scholar 

  30. Kusyanti, A., Puspitasari, D.R., Catherina, H.P.A., Sari, Y.A.L.: Information privacy concerns on teens as Facebook users in Indonesia. Proc. Comput. Sci. 124, 632–638 (2017)

    Article  Google Scholar 

  31. Larson, S.: Every single Yahoo account was hacked - 3 billion in all, October 2017. http://money.cnn.com/2017/10/03/technology/business/yahoo-breach-3-billion-accounts/index.html. Accessed 07 Dec 2020

  32. Larson, S.: Fitness app that revealed military bases highlights bigger privacy issues, January 2018. http://money.cnn.com/2018/01/29/technology/strava-privacy-data-exposed/index.html. Accessed 09 May 2019

  33. Luo, W., Xie, Q., Hengartner, U.: FaceCloak: an architecture for user privacy on social networking sites. In: International Conference on Computational Science and Engineering, CSE 2009, vol. 3, pp. 26–33. IEEE (2009)

    Google Scholar 

  34. Luo, W., Xie, Q., Hengartner, U.: FaceCloak download, August 2011. https://crysp.uwaterloo.ca/software/facecloak/download.html. Accessed 07 Dec 2020

  35. Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336–355 (2004)

    Article  Google Scholar 

  36. McCandless, D.: World’s biggest data breaches & hacks, April 2019. https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks. Accessed 07 Dec 2020

  37. McKnight, D.H., Chervany, N.L.: What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology. Int. J. Electron. Commer. 6(2), 35–59 (2001)

    Article  Google Scholar 

  38. Noyes, D.: Distribution of Twitter users worldwide as of January 2021, by gender (2021). https://www.statista.com/statistics/828092/distribution-of-users-on-twitter-worldwide-gender/. Accessed 10 Feb 2021

  39. Olivero, N., Lunt, P.: Privacy versus willingness to disclose in e-commerce exchanges: the effect of risk awareness on the relative role of trust and control. J. Econ. Psychol. 25(2), 243–262 (2004)

    Article  Google Scholar 

  40. Rezgui, Y., Marks, A.: Information security awareness in higher education: an exploratory study. Comput. Secur. 27(7–8), 241–253 (2008)

    Article  Google Scholar 

  41. Salzberg, M.: Diaspora - kickstarter pitch, April 2010. https://web.archive.org/web/20110814222702/, http://blog.joindiaspora.com/2010/04/27/kickstarter-pitch.html. Accessed 07 Dec 2020

  42. Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 167–196 (1996)

    Google Scholar 

  43. Sonderegger, A., Sauer, J.: The influence of design aesthetics in usability testing: effects on user performance and perceived usability. Appl. Ergon. 41(3), 403–410 (2010)

    Article  Google Scholar 

  44. Wainakh, A., Grube, T., Daubert, J., Porth, C., Mühlhäuser, M.: Tweet beyond the cage: a hybrid solution for the privacy dilemma in online social networks. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019)

    Google Scholar 

  45. Yang, H.: Young American consumers’ prior negative experience of online disclosure, online privacy concerns, and privacy protection behavioral intent. J. Consum. Satisf. Dissatisf. Complain. Behav. 25, 179–202 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Angela Borchert .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Borchert, A., Wainakh, A., Krämer, N., Mühlhäuser, M., Heisel, M. (2022). The Relevance of Privacy Concerns, Trust, and Risk for Hybrid Social Media. In: Ali, R., Kaindl, H., Maciaszek, L.A. (eds) Evaluation of Novel Approaches to Software Engineering. ENASE 2021. Communications in Computer and Information Science, vol 1556. Springer, Cham. https://doi.org/10.1007/978-3-030-96648-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-96648-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-96647-8

  • Online ISBN: 978-3-030-96648-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics