Abstract
While the body of privacy research on online social networks has been growing over the past several years, privacy problems emerged from the dynamism inherent in the launch of new features or interfaces have not been widely discussed. Drawing on the grounded theory approach, we aim to fill this gap by investigating the trigger conditions under which users may perceive the introduction of a new IT artifact as privacy threats. With the specific case of the New Profile introduced by Facebook, we conducted a content analysis of user responses posted on the official blog of Facebook. Results can be constructed as a process model including two stages. The first stage of the model presented four broad categories of trigger conditions of privacy concerns–information processing, increased accessibility, intrusion, and loss of control. The second stage describes three types of outcomes, including psychological outcomes, behavior outcomes, and suggested privacy mechanisms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Angwin, J., Raice, S., Spencer, E.A.: Facebook Retreats on Privacy. The Wall Street Journal (2011)
Culnan, M.J., Williams, C.C.: How Ethics Can Enhance Organizational Privacy: Les-sons from the ChoicePoint and TJX Data Breaches. MIS Quarterly 33(4), 673–687 (2009)
Eisenhardt, K.M.: Building Theories from Case Study Research. The Academy of Management Review 14(4), 532–550 (1989)
Ellison, N.B., Steinfield, C., Lampe, C.: The Benefits of Facebook “Friends”: Social Capital and College Students’ Use of Online Social Network Sites. Journal of Computer-Mediated Communication 12(4), 1143–1168 (2007)
Facebook Blog: Introducing New Profile (2010), http://blog.facebook.com/blog.php?post=462201327130
Facebook Blog: New Profile Is Here (2011), http://blog.facebook.com/blog.php?post=479551972130
Facebook Statistics, http://facebook.com/press/info.php?statistics
Goulielmos, M.: Systems development approach: transcending methodology. Information Systems Journal 14, 363–386 (2004)
Grimmelmann, J.: Saving Facebook. Iowa Law Review 94, 1137–1206 (2009)
Gross, D.: Explaining Facebook’s new profile pages, http://articles.cnn.com/2010-12-06/tech/facebook.profile.update_1_profile-photo-facebook-friends-facebook-page?_s=PM:TECH
Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Workshop on Privacy in the Electronic Society. ACM, New York (2005)
Helft, M.: Critics Say Google Invades Privacy With New Service, http://www.nytimes.com/2010/02/13/technology/internet/13google.html
Hoadley, C.M., Xu, H., Lee, J.J., Rosson, M.B.: Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry. Electronic Commerce Research and Applications 9(1), 50–60 (2010)
Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social Phishing. Communications of the ACM 50(10), 94–100 (2007)
Krasnova, H., Hildebrand, T., Günther, O., Kovrigin, S., Nowobilska, A.: Why Par-ticipat. In: An Online Social Network: An Empirical Analysis. In: European Conference on Information Systems, Galway, Ireland (2008)
Malhotra, N.K., Kim, S.S., Agarwa, J.: Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15(4), 336–355 (2004)
Orlikowski, W.J.: Case Tools as Organizational Change: Investigating Incremental and Radical Changes in Systems Development. MIS Quarterly 17(3), 309–340 (1993)
Palen, L., Dourish, P.: Unpacking “privacy” for a networked world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136. ACM Press, Ft. Lauderdale (2003)
Smith, H.J., Milberg, J.S., Burke, J.S.: Information Privacy: Measuring Individuals’ Concerns About Organizational Practices. MIS Quarterly 20(2), 167–196 (1996)
Solove, D.J.: A Taxonomy of Privacy. University of Pennsylvania Law Review 154, 3 (2006)
Strauss, A.L., Corbin, J.: Basics of Qualitative Research: Grounded Theory Procedures and Techniques. Sage (2008)
Urquhart, C., Lehmann, H., Myers, M.D.: Putting the ‘theory’ back into grounded theory: guidelines for grounded theory studies in information systems. Information Systems Journal 20, 357–381 (2010)
Xu, H., Dinev, T., Smith, H.J., Hart, P.: Information Privacy Concerns: Linking Indi-vidual Perceptions with Institutional Privacy Assurances. Journal of the Association for Information Systems 12(12), 798–824 (2011)
Xu, H., Gupta, S.: The Effects of Privacy Concerns and Personal Innovativeness on Potential and Experienced Customers’ Adoption of Location-Based Services. Electronic Markets 19(2), 137–140 (2009)
Zhang, N., Wang, C., Xu, Y.: Privacy in Online Social Networks. In: International Conference on Information System, Shanghai, China (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zheng, S., Shi, P., Xu, H., Zhang, C. (2012). Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users’ Privacy Concerns. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds) Trust and Trustworthy Computing. Trust 2012. Lecture Notes in Computer Science, vol 7344. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30921-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-30921-2_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30920-5
Online ISBN: 978-3-642-30921-2
eBook Packages: Computer ScienceComputer Science (R0)