Abstract
Users generate a massive amount of personal, partly sensitive data in online social media. In the past, data breaches made evident that service providers of social media lack in adequately protecting this data leading to user concerns in regards to their privacy. Privacy-preserving social media emerged to address this issue by providing more secure environments for private social exchanges. However, these platforms often fall short of attracting users away from conventional social media and establishing users’ trust in them. In this work, we aim to enhance the trustworthiness of privacy-preserving social media, in particular a hybrid social media application. For this purpose, we first analyze the relationships between privacy concerns, trusting beliefs, risk beliefs, and willingness to use. Second, we examine the effect of user characteristics on these relationships. Third, we mitigate privacy concerns via trust-related software features developed with the TrustSoFt method. We conduct a thorough user study to assess the impact of these features on the privacy concerns and trustworthiness. Our findings indicate the special importance of addressing particular privacy concerns, such as “Awareness of Privacy Practices”. Furthermore, results suggest that older individuals as well as individuals that have experience with privacy incidents, are more susceptible to trust-related software features.
A. Borchert and A. Wainakh—Funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) - 251805230/GRK 2050 and 2167.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aiken, L.S., West, S.G., Reno, R.R.: Multiple Regression: Testing and Interpreting Interactions. Sage (1991)
Alisie, M.: Unveiling AKASHA, May 2016. https://akasha.org/blog/2016/05/03/unveiling-akasha. Accessed 21 Mar 2019
Anderson, J.C., Gerbing, D.W.: Structural equation modeling in practice: a review and recommended two-step approach. Psychol. Bull. 103(3), 411 (1988)
Borchert, A., Díaz Ferreyra, N.E., Heisel, M.: Building trustworthiness in computer-mediated introduction: a facet-oriented framework. In: International Conference on Social Media and Society, pp. 39–46 (2020)
Borchert, A., Ferreyra, N.E.D., Heisel, M.: A conceptual method for eliciting trust-related software features for computer-mediated introduction. In: ENASE, pp. 269–280 (2020)
Borchert, A., Wainakh, A., Krämer, N., Mühlhäuser, M., Heisel, M.: Mitigating privacy concerns by developing trust-related software features for a hybrid social media application. In: ENASE, pp. 269–280 (2021)
Büttner, O.B., Göritz, A.S.: Perceived trustworthiness of online shops. J. Consum. Behav.: Int. Res. Rev. 7(1), 35–50 (2008)
Choi, J.P.: Herd behavior, the “penguin effect”, and the suppression of informational diffusion: an analysis of informational externalities and payoff interdependency. Rand J. Econ. 407–425 (1997)
Colquitt, J.A., Scott, B.A., LePine, J.A.: Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. J. Appl. Psychol. 92(4), 909 (2007)
Daubert, J., Bock, L., Kikirasy, P., Mühlhäuser, M., Fischer, M.: Twitterize: anonymous micro-blogging. In: 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), pp. 817–823. IEEE (2014)
Dean, B.: Social network usage & growth statistics: how many people use social media in 2021? (2021). https://backlinko.com/social-media-users. Accessed 24 June 2021
Donath, J.: How social media design shapes society. In: CHI 2014 Extended Abstracts on Human Factors in Computing Systems, pp. 1057–1058 (2014)
Dowling, G.R.: Perceived risk: the concept and its measurement. Psychol. Mark. 3(3), 193–210 (1986)
Ebert, N., Ackermann, K.A., Heinrich, P.: Does context in privacy communication really matter?-A survey on consumer concerns and preferences. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1–11 (2020)
Elliott, A.C., Woodward, W.A.: Statistical Analysis Quick Reference Guidebook: With SPSS Examples. Sage (2007)
Goldfarb, A., Tucker, C.: Shifts in privacy concerns. Am. Econ. Rev. 102(3), 349–53 (2012)
Graffi, K., Podrajanski, S., Mukherjee, P., Kovacevic, A., Steinmetz, R.: A distributed platform for multimedia communities (2008)
Guardian, T.: Facebook to contact 87 million users affected by data breach, April 2018. https://www.theguardian.com/technology/2018/apr/08/facebook-to-contact-the-87-million-users-affected-by-data-breach. Accessed 07 Dec 2020
Guardian, T.: Huge Facebook breach leaves thousands of other apps vulnerable, October 2018. https://www.theguardian.com/technology/2018/oct/02/facebook-hack-compromised-accounts-tokens. Accessed 18 Nov 2020
Hayes, A.F.: Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach. Guilford Publications (2017)
Heirman, W., Walrave, M., Ponnet, K.: Predicting adolescents’ disclosure of personal information in exchange for commercial incentives: an application of an extended theory of planned behavior. Cyberpsychol. Behav. Soc. Netw. 16(2), 81–87 (2013)
Holmes, A.: 533 million Facebook users’ phone numbers and personal data have been leaked online (2021). https://www.businessinsider.com/stolen-data-of-533-million-facebook-users-leaked-online-2021-4?r=US&IR=T. Accessed 24 June 2021
Hu, L.T., Bentler, P.M.: Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Struct. Eqn. Model.: A Multidisc. J. 6(1), 1–55 (1999)
Jarvenpaa, S.L., Tractinsky, N., Saarinen, L.: Consumer trust in an internet store: a cross-cultural validation. J. Comput.-Mediat. Commun. 5(2), JCMC526 (1999)
Jiang, Z., Heng, C.S., Choi, B.C.: Research note-privacy concerns and privacy-protective behavior in synchronous online social interactions. Inf. Syst. Res. 24(3), 579–595 (2013)
Jose, P.E.: Doing Statistical Mediation and Moderation. Guilford Press (2013)
Junco, R.: Comparing actual and self-reported measures of Facebook use. Comput. Hum. Behav. 29(3), 626–631 (2013)
Kani-Zabihi, E., Helmhout, M.: Increasing service users’ privacy awareness by introducing on-line interactive privacy features. In: Laud, P. (ed.) NordSec 2011. LNCS, vol. 7161, pp. 131–148. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29615-4_10
Kozlowska, I.: Facebook and data privacy in the age of Cambridge analytica. The University of Washington, Seattle (2018). Accessed 1 Aug 2019
Kusyanti, A., Puspitasari, D.R., Catherina, H.P.A., Sari, Y.A.L.: Information privacy concerns on teens as Facebook users in Indonesia. Proc. Comput. Sci. 124, 632–638 (2017)
Larson, S.: Every single Yahoo account was hacked - 3 billion in all, October 2017. http://money.cnn.com/2017/10/03/technology/business/yahoo-breach-3-billion-accounts/index.html. Accessed 07 Dec 2020
Larson, S.: Fitness app that revealed military bases highlights bigger privacy issues, January 2018. http://money.cnn.com/2018/01/29/technology/strava-privacy-data-exposed/index.html. Accessed 09 May 2019
Luo, W., Xie, Q., Hengartner, U.: FaceCloak: an architecture for user privacy on social networking sites. In: International Conference on Computational Science and Engineering, CSE 2009, vol. 3, pp. 26–33. IEEE (2009)
Luo, W., Xie, Q., Hengartner, U.: FaceCloak download, August 2011. https://crysp.uwaterloo.ca/software/facecloak/download.html. Accessed 07 Dec 2020
Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336–355 (2004)
McCandless, D.: World’s biggest data breaches & hacks, April 2019. https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks. Accessed 07 Dec 2020
McKnight, D.H., Chervany, N.L.: What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology. Int. J. Electron. Commer. 6(2), 35–59 (2001)
Noyes, D.: Distribution of Twitter users worldwide as of January 2021, by gender (2021). https://www.statista.com/statistics/828092/distribution-of-users-on-twitter-worldwide-gender/. Accessed 10 Feb 2021
Olivero, N., Lunt, P.: Privacy versus willingness to disclose in e-commerce exchanges: the effect of risk awareness on the relative role of trust and control. J. Econ. Psychol. 25(2), 243–262 (2004)
Rezgui, Y., Marks, A.: Information security awareness in higher education: an exploratory study. Comput. Secur. 27(7–8), 241–253 (2008)
Salzberg, M.: Diaspora - kickstarter pitch, April 2010. https://web.archive.org/web/20110814222702/, http://blog.joindiaspora.com/2010/04/27/kickstarter-pitch.html. Accessed 07 Dec 2020
Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 167–196 (1996)
Sonderegger, A., Sauer, J.: The influence of design aesthetics in usability testing: effects on user performance and perceived usability. Appl. Ergon. 41(3), 403–410 (2010)
Wainakh, A., Grube, T., Daubert, J., Porth, C., Mühlhäuser, M.: Tweet beyond the cage: a hybrid solution for the privacy dilemma in online social networks. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019)
Yang, H.: Young American consumers’ prior negative experience of online disclosure, online privacy concerns, and privacy protection behavioral intent. J. Consum. Satisf. Dissatisf. Complain. Behav. 25, 179–202 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Borchert, A., Wainakh, A., Krämer, N., Mühlhäuser, M., Heisel, M. (2022). The Relevance of Privacy Concerns, Trust, and Risk for Hybrid Social Media. In: Ali, R., Kaindl, H., Maciaszek, L.A. (eds) Evaluation of Novel Approaches to Software Engineering. ENASE 2021. Communications in Computer and Information Science, vol 1556. Springer, Cham. https://doi.org/10.1007/978-3-030-96648-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-96648-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-96647-8
Online ISBN: 978-3-030-96648-5
eBook Packages: Computer ScienceComputer Science (R0)