skip to main content
10.1145/3400806.3400810acmotherconferencesArticle/Chapter ViewAbstractPublication PagessmsocietyConference Proceedingsconference-collections
research-article

Applying Protection Motivation Theory to Predict Facebook Users’ Withdrawal and Disclosure Intentions

Published: 22 July 2020 Publication History

Abstract

Because legislation only slowly finds ways to better protect Internet users’ privacy and is heavily country-dependent, self-data protection is of major importance. The current investigation applies the protection motivation theory to investigate factors that predict Facebook users’ privacy protection motivation and to examine whether fear appeals and social norms can raise participants’ intention to protect personal data. In a 2 (warning vs. neutral message) x 3 (high vs. low norms vs. control) online experiment (N = 304), participants were told they would receive a personalized privacy protection recommendation based on their Facebook profile's privacy settings. Whereas neither the fear appeal nor high social norms led to an increase in privacy protection motivation, analyses revealed that privacy threat perception and the perceived effectiveness of privacy protection are important factors for explaining self-withdrawal intention among Facebook users.

References

[1]
Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (Jan. 2015), 509-514.
[2]
Icek Ajzen. 1991. The theory of planned behavior. Organizational behavior and human decision processes. 50, 2 (Dec. 1991), 179-211.
[3]
Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding (1975). Monterey, CA: Cole Publishing Company.
[4]
Miriam Bartsch and Tobias Dienlin. 2016. Control your Facebook: An analysis of online privacy literacy. Computers in Human Behavior 56 (Mar. 2016), 147-154. https://doi.org/10.1016/j.chb.2015.11.022
[5]
Sophie C. Boerman, Sanne Kruikemeier, and Frederik J. Zuiderveen Borgesius. 2018. Exploring motivations for online privacy protection behavior: Insights from panel data. Communication Research (Oct. 2018). https://doi.org/10.1177%2F0093650218800915
[6]
Nadine Bol, Tobias Dienlin, Sanne Kruikemeier, Marijn Sax, Sophie C. Boerman, Joanna Strycharz, Natali Helberger, and Claes H. de Vreese. 2018. Understanding the effects of personalization as a privacy calculus: Analyzing self-disclosure across health, news, and commerce contexts. Journal of Computer-Mediated Communication 23, 6 (Nov. 2018), 370-388.
[7]
Jacob Cohen. 1988. Statistical power analysis for the behavioral sciences. Hillsdale, NJ: Erlbaum.
[8]
Mary J. Culnan, and Pamela K. Armstrong. 1999. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization science 10, 1 (Feb. 1999), 104-115. https://doi.org/10.1287/orsc.10.1.104
[9]
Bernhard Debatin. 2011. Ethics, privacy, and self-restraint in social networking. Privacy online. Springer, Berlin, Germany (Jun. 2011), 47-60.
[10]
Tobias Dienlin, and Miriam J. Metzger. 2016. An extended privacy calculus model for SNSs: Analyzing self-disclosure and self-withdrawal in a representative US sample. Journal of Computer-Mediated Communication 21, 5 (Sep. 2016), 368-383. https://doi.org/10.1111/jcc4.12163
[11]
Tamara Dinev, and Paul Hart. 2006. An extended privacy calculus model for e-commerce transactions. Information systems research 17, 1 (Mar. 2006), 61-80. https://doi.org/10.1287/isre.1060.0080
[12]
Nicole B. Ellison, Jessica Vitak, Charles Steinfield, Rebecca Gray, and Cliff Lampe. 2011. Negotiating privacy concerns and social capital needs in a social media environment. Privacy online. Springer, Berlin, Germany (Jun. 2011), 19-32.
[13]
Franz Faul, Edgar Erdfelder, Albert-Georg Lang, and Axel Buchner. 2007. G* Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior research methods 39, 2 (May 2007), 175-191.
[14]
Christian P. Hoffmann, Christoph Lutz, and Giulia Ranzini. 2016. Privacy cynicism: A new approach to the privacy paradox. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 10, 4 (Dec. 2016). https://dx.doi.org/10.2139/ssrn.3319830
[15]
Princely Ifinedo. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security 31, 1 (Feb. 2012), 83-95. https://doi.org/10.1016/j.cose.2011.10.007
[16]
Gohar F. Khan, Bobby Swar, and Sang K. Lee. 2014. Social media risks and benefits: A public sector perspective. Social science computer review 32, 5 (Mar. 2014), 606-627. https://doi.org/10.1177%2F0894439314524701
[17]
Nicole C. Krämer, and Johanna Schäwel. 2019. Mastering the challenge of balancing self-disclosure and privacy in social media. Current opinion in psychology 31 (Aug. 2019), 67-71. https://doi.org/10.1016/j.copsyc.2019.08.003
[18]
Hanna Krasnova, Sarah Spiekermann, Ksenia Koroleva, and Thomas Hildebrand. 2010. Online social networks: Why we disclose. Journal of information technology 25, 2 (Jun. 2010), 109-125. https://doi.org/10.1057%2Fjit.2010.6
[19]
LaRose, Robert, and Nora J. Rifon. 2007. Promoting i‐safety: effects of privacy warnings and privacy seals on risk assessment and online privacy behavior. Journal of Consumer Affairs 41.1 (Mar. 2007): 127-149. https://doi.org/10.1111/j.1745-6606.2006.00071.x
[20]
Bibb Latané. 1981. The psychology of social impact. American psychologist 36, 4 (Apr. 1981), 343-356. https://doi.org/10.1037/0003-066X.36.4.343
[21]
Anthony D. Miyazaki, and Ana Fernandez. 2001. Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer affairs 35, 1 (Jun. 2001), 27-44. https://doi.org/10.1111/j.1745-6606.2001.tb00101.x
[22]
Norshidah Mohamed, and Ili H. Ahmad. 2012. Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior 28, 6 (Nov. 2012), 2366-2375. https://doi.org/10.1016/j.chb.2012.07.008
[23]
Jordana N. Navarro, and Jana L. Jasinski. 2012. Going cyber: Using routine activities theory to predict cyberbullying experiences. Sociological Spectrum 32, 1 (Jan. 2012), 81-94. https://doi.org/10.1080/02732173.2012.628560
[24]
Nora J. Rifon, Robert LaRose, and Sejung M. Choi. 2005. Your privacy is sealed: Effects of web privacy seals on trust and personal disclosures. Journal of Consumer Affairs 39, 2 (Sep. 2005), 339-362. https://doi.org/10.1111/j.1745-6606.2005.00018.x
[25]
Ronald W. Rogers. 1975. A protection motivation theory of fear appeals and attitude change. The journal of psychology 91, 1 (Jun. 1975), 93-114. https://doi.org/10.1080/00223980.1975.9915803
[26]
Ronald W. Rogers. 1983. Cognitive and psychological processes in fear appeals and attitude change: A revised theory of protection motivation. Social psychophysiology: A sourcebook (Sep. 1983), 153-176.
[27]
Ronald W. Rogers, and C. William Deckner. 1975. Effects of fear appeals and physiological arousal upon emotion, attitudes, and cigarette smoking. Journal of personality and social psychology 32, 2 (Aug. 1975), 222-230. https://doi.org/10.1037/0022-3514.32.2.222
[28]
Alexander K. Saeri, Claudette Ogilvie, Stephen T. La Macchia, Joanne R. Smith, and Winnifred R. Louis. 2014. Predicting Facebook users’ online privacy protection: Risk, trust, norm focus theory, and the theory of planned behavior. The Journal of social psychology 154, 4 (Apr. 2014), 352-369. https://doi.org/10.1080/00224545.2014.914881
[29]
Johanna Schäwel. 2019. How to Raise Users’ Awareness of Online Privacy: An Empirical and Theoretical Approach for Examining the Impact of Persuasive Privacy Support Measures on Users’ Self-Disclosure on Online Social Networking Sites. Ph.D. Dissertation. University of Duisburg-Essen, Duisburg, Germany. https://doi.org/10.17185/duepublico/70691
[30]
Daniel J. Solove. 2008. Understanding privacy. Harvard University Press, Cambridge, MA.
[31]
Erin L. Spottswood, and Jeffrey T. Hancock. 2017. Should I share that? Prompting social norms that influence privacy behaviors on a social networking site. Journal of Computer-Mediated Communication 22, 2 (Mar. 2017), 55-70. https://doi.org/10.1111/jcc4.12182
[32]
Robert D. Stainback, and Ronald W. Rogers. 1983. Identifying effective components of alcohol abuse prevention programs: Effects of fear appeals, message style, and source expertise. International Journal of the Addictions 18, 3 (Apr. 1983), 393-405. https://doi.org/10.3109/10826088309039356
[33]
Sabine Trepte, Doris Teutsch, Philipp K. Masur, Carolin Eicher, Mona Fischer, Alisa Hennhöfer, and Fabienne Lind. 2015. Do people know about privacy and data protection strategies? Towards the “Online Privacy Literacy Scale” (OPLIS). Reforming European data protection law. Springer, Dordrecht, Germany.
[34]
Sonja Utz. 2015. The function of self-disclosure on social network sites: Not only intimate, but also positive and entertaining self-disclosures increase the feeling of connection. Computers in Human Behavior 45 (Apr. 2015), 1-10. https://doi.org/10.1016/j.chb.2014.11.076
[35]
Sonja Utz, and Nicole C. Krämer. 2009. The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 3, 2 (2009).
[36]
Alan F. Westin. 1967. Privacy and Freedom. IG Publishing: New York, NY.
[37]
Kim Witte. 1992. Putting the fear back into fear appeals: The extended parallel process model. Communications Monographs 59, 4 (1992), 329-349. https://doi.org/10.1080/03637759209376276
[38]
Alyson L. Young, and Anabel Quan-Haase. 2013. Privacy protection strategies on Facebook: The Internet privacy paradox revisited. Information, Communication & Society 16, 4 (Feb. 2013), 479-500. https://doi.org/10.1080/1369118X.2013.777757

Cited By

View all
  • (2025)Google knows me too well! Coping with perceived surveillance in an algorithmic profiling contextComputers in Human Behavior10.1016/j.chb.2024.108536165(108536)Online publication date: Apr-2025
  • (2024)Self-promotion with a chance of warnings: Exploring Cybersecurity Communication Among Government Institutions on LinkedInProceedings of the International Conference on Mobile and Ubiquitous Multimedia10.1145/3701571.3701575(119-132)Online publication date: 1-Dec-2024
  • (2024)Differences in access to privacy information can partly explain digital inequalities in privacy literacy and self-efficacyBehaviour & Information Technology10.1080/0144929X.2024.2349183(1-16)Online publication date: 3-May-2024
  • Show More Cited By
  1. Applying Protection Motivation Theory to Predict Facebook Users’ Withdrawal and Disclosure Intentions

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      SMSociety'20: International Conference on Social Media and Society
      July 2020
      317 pages
      ISBN:9781450376884
      DOI:10.1145/3400806
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 July 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Privacy protection motivation
      2. fear-appeal
      3. self-disclosure
      4. social network site
      5. social norms

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      SMSociety'20

      Acceptance Rates

      Overall Acceptance Rate 78 of 189 submissions, 41%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)72
      • Downloads (Last 6 weeks)7
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Google knows me too well! Coping with perceived surveillance in an algorithmic profiling contextComputers in Human Behavior10.1016/j.chb.2024.108536165(108536)Online publication date: Apr-2025
      • (2024)Self-promotion with a chance of warnings: Exploring Cybersecurity Communication Among Government Institutions on LinkedInProceedings of the International Conference on Mobile and Ubiquitous Multimedia10.1145/3701571.3701575(119-132)Online publication date: 1-Dec-2024
      • (2024)Differences in access to privacy information can partly explain digital inequalities in privacy literacy and self-efficacyBehaviour & Information Technology10.1080/0144929X.2024.2349183(1-16)Online publication date: 3-May-2024
      • (2024)Digitale Gesundheitstechnologien – das Recht als Hemmschuh oder Wegbereiter?Legal regulation of digital public health interventions—hindrance or stimulus?Bundesgesundheitsblatt - Gesundheitsforschung - Gesundheitsschutz10.1007/s00103-024-03835-3Online publication date: 8-Feb-2024
      • (2023)Balancing perceptions of targeting: An investigation of political microtargeting transparency through a calculus approachPLOS ONE10.1371/journal.pone.029532918:12(e0295329)Online publication date: 7-Dec-2023
      • (2023)A longitudinal examination of Internet users’ privacy protection behaviors in relation to their perceived collective value of privacy and individual privacy concernsNew Media & Society10.1177/1461444822114279926:10(5942-5961)Online publication date: 5-Jan-2023
      • (2023)“Dump it, Destroy it, Send it to Data Heaven”: Blind People’s Expectations for Visual Privacy in Visual Assistance TechnologiesProceedings of the 20th International Web for All Conference10.1145/3587281.3587296(134-147)Online publication date: 30-Apr-2023
      • (2023)Tailoring a Persuasive Game to Promote Secure Smartphone BehaviourProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581038(1-18)Online publication date: 19-Apr-2023
      • (2023)Development and Validation of the Need for Privacy Scale (NFP-S)Communication Methods and Measures10.1080/19312458.2023.224601418:1(48-71)Online publication date: 20-Aug-2023
      • (2023)Correcting overconfidence in online privacy: experimenting with an educational gameInformation, Communication & Society10.1080/1369118X.2023.216636026:5(990-1007)Online publication date: 18-Jan-2023
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media