Literature DB >> 29995525

Privacy Concerns and Self-Disclosure in Private and Public Uses of Social Media.

Anatoliy Gruzd1, Ángel Hernández-García2.   

Abstract

The study contributes to the ongoing debate about the "privacy paradox" in the context of using social media. The presence of a privacy paradox is often declared if there is no relationship between users' information privacy concerns and their online self-disclosure. However, prior research has produced conflicting results. The novel contribution of this study is that we consider public and private self-disclosure separately. The data came from a cross-national survey of 1,500 Canadians. For the purposes of the study, we only examined the subset of 545 people who had at least one public account and one private account. Going beyond a single view of self-disclosure, we captured five dimensions of self-disclosure: Amount, Depth, Polarity, Accuracy, and Intent; and two aspects of privacy concerns: concerns about organizational and social threats. To examine the collected data, we used Partial Least Squares Structural Equation Modeling. Our research does not support the presence of a privacy paradox as we found a relationship between privacy concerns from organizational and social threats and most of the dimensions of self-disclosure (even if the relationship was weak). There was no difference between patterns of self-disclosure on private versus public accounts. Different privacy concerns may trigger different privacy protection responses and, thus, may interact with self-disclosure differently. Concerns about organizational threats increase awareness and accuracy while reducing amount and depth, while concerns about social threats reduce accuracy and awareness while increasing amount and depth.

Entities:  

Keywords:  information privacy; privacy paradox; private versus public; self-disclosure; social media

Mesh:

Year:  2018        PMID: 29995525      PMCID: PMC6719399          DOI: 10.1089/cyber.2017.0709

Source DB:  PubMed          Journal:  Cyberpsychol Behav Soc Netw        ISSN: 2152-2715


Introduction

Considering the prevalence of self-disclosure on social media, research has sought to understand what makes one divulge personal information online by examining a number of intrinsic and extrinsic factors.[1] One such factor is a concern about individual privacy. Understanding how one's privacy concerns may influence their self-disclosure on social media is especially relevant today, in light of a recent scandal of Cambridge Analytica misusing data from millions of Facebook users to improve microtargeting in political advertisements, and a consequent user-driven #DeleteFacebook campaign.[2,3] According to Privacy Calculus Theory (PCT), people make conscious decisions about their self-disclosure by weighing the benefits of disclosure against their privacy concerns associated with such disclosure.[4] The theory contends that people with increased privacy concerns would share less on social media; nonetheless, privacy concerns alone may not stop people from self-disclosing since either their perceived benefits outweigh the perceived risks or their privacy concerns are being moderated by information privacy protection strategies.[5-8] We contribute to this research in the following three ways: first, the self-disclosure construct often used in privacy and self-disclosure research mostly captures depth and/or breadth of disclosure, while omitting other dimensions of self-disclosure[9]: accuracy, intention, and polarity. Second, privacy concerns are often examined without separating organizational and social threats (with few exceptions[10,11]). We examine the relationship between privacy concerns and self-disclosure using all five dimensions of self-disclosure and two separate constructs of privacy. The distinction recognizes that social media users may be concerned about data misuse by organizations or other social media users. Thus, we ask the following: Third, prior research often asks respondents about social media use without indicating whether the disclosure occurs on private or public accounts; as a result, we ask respondents to report their disclosure in accordance with their own privacy boundaries and report whether their accounts are primarily private or primarily public. This is an important distinction as the notions of “private” and “public” are not binary, but contextual and user specific.[12-14] Furthermore, even within a single platform, there may be different levels and expectations of privacy.[15,16] To understand the role of public and private uses of social media, we ask the following:

Literature Review and Hypotheses

To understand what influences people's privacy concerns and inform organizations how they can minimize risks and reduce negative perception, scholars have examined factors contributing to people's concerns associated with information privacy. Smith, Milberg, and Burke's Concern for Information Privacy (CFIP)[17] identified four fundamental factors that influence privacy concerns in response to organizations' use or potential use of personal information: collection, unauthorized secondary use, improper access, and errors in personal information. Stewart and Segars refined CFIP as a multidimensional construct comprising the four variables.[18] CFIP has been validated in various contexts such as internet use,[19] mobile use,[20] m-commerce,[21] and instant messaging.[22] By applying CFIP to social media use, Osatuyi developed the Concern for Social Media Information Privacy (CFSMIP) measurement scale.[23] In addition, Krasnova proposed the Concern about Social Threats scale (CST) to measure concerns about social threats from other users potentially misusing their information or posting embarrassing content about them.[24,25] Self-disclosure refers to a social process of sharing private information with another.[9] Although the concept originally focused on disclosure between two people, it is also useful in the context of sharing private information with more than one person on social media.[26] As proposed by Wheeless,[9] self-disclosure expands across five dimensions: Intent: the disclosure is intentional or not; Amount: length and frequency of disclosure; Polarity: positive or negative valence; Depth: level of intimacy; and Accuracy: level of truthfulness. All five dimensions are important as they may be influenced by one's privacy concerns, but at different levels. This study contributes to the ongoing debate about the “privacy paradox”.[27] The presence of a privacy paradox is declared if there is no relationship between users' privacy concerns and their online participation.[28,29] However, prior research has produced conflicting results that may be due to different study populations, contexts, and platforms, or may be explained by the operationalization of privacy concerns and self-disclosure. To interrogate the presence of the privacy paradox, we first turn to work on Information Privacy-Protective Responses (IPPRs). When a user perceives a threat to their privacy, they engage in IPPR, which may include information provision, private action, or public action.[30] For example, a user may choose not to post information, thus reducing the amount and depth of self-disclosure. Thus, we hypothesize the following: H1a: CFSMIP negatively predicts the of self-disclosure on social media. H1b: CST negatively predicts the of self-disclosure on social media. H2a: CFSMIP negatively predicts the of self-disclosure on social media. H2b: CST negatively predicts the of self-disclosure on social media. Self-disclosure accuracy and polarity relate to how people manage their online identity. According to Leary and Kowalski's impression management work,[31] people post accurate information about themselves if they feel that others may validate such information. This process has been observed in the context of online dating, as well as in a more general case of Facebook use, where users were more likely to choose not to post certain information rather than posting inaccurate information about themselves.[24,32] This may be especially applicable on social media where other users are in a position to verify one's posted information.[33] People may also recognize that third parties can use the information to make decisions about them (e.g., social media screening of job applicants[34]). Thus, we hypothesize the following: H3a: CFSMIP positively predicts the of self-disclosure on social media. H3b: CST positively predicts the of self-disclosure on social media. People may choose to engage in “selective self-presentation”[35] to enhance their online image and present themselves in a socially desirable manner.[36] For example, Facebook users post positive emotional words in their public status updates as a strategy to manage their self-presentation on the platform.[37] In our work, we want to explore to what extent such positive self-disclosure may be linked to one's privacy concerns. Although we did not find a direct link in the literature, we hypothesize that a strategy of posting favorable content or using positive statements may be an IPPR. To test this, we pose the following: H4a: CFSMIP positively predicts the positive of self-disclosure on social media. H4b: CST positively predicts the positive of self-disclosure on social media. Prior research suggests that privacy concerns have a negative relationship with intention to disclose.[38,39] However, since intent captures one's awareness of self-disclosure, this dimension is aligned with the Conscious Control construct,[24] rather than the future intention to share information. Krasnova et al.[24] found that concerns about social threats made participants (primarily students) more aware of their self-disclosure in social media, but interestingly, the organizational information privacy concerns did not have the same impact on self-disclosure intent (conscious control). We want to disentangle a nuanced relationship between privacy concerns and user's awareness of their self-disclosure by testing the following: H5a: CFSMIP positively predicts the of self-disclosure on social media. H5b: CST positively predicts the of self-disclosure on social media. The final two hypotheses investigate the nature of self-disclosure in public or private uses of social media. Previous work[40] evidences that the perceived publicness of a social networking site has a negative relationship with the amount and depth of self-disclosure. This suggests a stronger role of privacy concerns on users' self-disclosure through public versus private accounts. Considering that social media users may share more intimate information on their private accounts that third parties are less likely to access, we expect that concerns about threats from other users would be more pronounced than threats from third parties when disclosing on a private account; thus, we hypothesize the following: H6a: CFSMIP has a stronger impact on public self-disclosure than private self-disclosure on social media. H6b: CST has a stronger impact on private self-disclosure than public self-disclosure on social media.

Materials and Methods

Data collection

We collected data using a cross-national survey among Canadians based on Research Now's Internet panel population. In total, we collected 1,500 responses that were census balanced by age, gender, and location, but in this study, we only examined the subset of 545 people who had at least one public account and one private account (Table 1). The online survey was open from June 1 to July 15, 2017, and hosted by Qualtrics.
Table 1.

Sample Demographics

 N%Avg. No. of accountsFacebookYouTubeTwitterInstagramLinkedInPinterestSnapchatTumblrRedditBlog
Gender
 Female304565 (SD: 2)290235194216175219143804454
 Male241445 (2)2341961501121526167304342
Age
 Under 25119226 (SD: 2)1141097989525883513820
 25–34135256 (2)13311495104859074332521
 35–44103195 (2)100797460684830141520
 45–5478144 (2)715142364935105213
 55+110204 (2)1067854397349137722
 Total545 5 (2)5244313443283272802101108796
 100%  96%79%63%60%60%51%39%20%16%18%
Sample Demographics

Instrument design

The measurement items used in this research have been validated by other researchers as outlined below (Appendix Tables A1–A3). Following Lai and Yang,[26] and Leung,[41] we captured five dimensions of self-disclosure: Amount (SDAm), Depth (SDD), Positive/Negative Valence or Polarity (SDPN), Accuracy (SDAc), and Intent (SDI). Originally proposed by Wheeless,[9] these items have been adapted to the social media context.[41-43] To measure privacy concerns, we relied on two constructs: concerns about social and organizational threats. Following Stewart and Segars,[18] Concern for Information Privacy (CFIP) assesses concerns for information privacy in response to organizations' potential use of their personal information, across four dimensions: collection (COL), errors (ERR), secondary use (SUS), and unauthorized access (UAC). We use the CFSMIP instrument developed by Osatuyi.[23] The second privacy construct, Concern about Social Threats, represents people's concerns related to other users' potential misuse of their information. Following Krasnova et al.,[24] this construct was measured using three indicators (CST1–3) related to other users posting embarrassing content or misusing information posted by this person on social media.

Data analysis

To examine the collected data, we used Partial Least Squares Structural Equation Modeling (PLS-SEM). PLS-SEM is the preferred method to analyze complex models when the aim of the analysis is prediction, making no assumption about data distribution.[44] Furthermore, PLS models can generate predictions and prediction intervals for manifest items both in-sample and out-of-sample,[45] and perform model comparisons between two groups through multigroup analysis.[46] As there is no consistency as to whether CFIP/CFSMIP should be conceptualized as reflective-reflective or reflective-formative, we ran a confirmatory tetrad analysis, which supported the definition of the second-order construct as reflective-formative. We consider a formative measurement model specification[44] as both of the measurement model's nonredundant tetrads are significantly different from zero. We then followed a recommended two-step procedure: (a) examining reliability and validity of the measurement model and (b) analyzing the structural model.[47] We used the repeated indicator approach using a factor weighting scheme to examine the hierarchical structural model, and the bootstrapping procedure implemented in SmartPLS 3.2.6 with 5,000 iterations to assess the significance of paths. The general rules for assessment follow Hair et al.[44,48] The comparative nature of the study requires measurement model assessment and, before structural model assessment, a measurement invariance assessment. Thus, the analysis includes a measurement model assessment—of both reflective and formative variables—for each group, and then a measurement invariance (configurational, compositional, and scalar invariance) assessment. See Appendix Tables A4–A7 for more details. Figure 1 presents the results of the structural model assessment.

Results of the structural model assessment.

Results of the structural model assessment. private more more public private more more public

Results

These surprising results contradict H1b–3b and H5b, which suggest that concerns about social threats have an opposite relationship with self-disclosure practices compared to organizational information privacy concerns. A possible explanation is that people might be employing different IPPR depending on whether the perceived threats are from organizations or individuals. For example, users may choose to withhold information, post anonymously, share inaccurate information, or report privacy concerns to regulators.[5-8] Similarly, Alashoor et al. found a negative relationship between students' privacy concerns and their accuracy of self-disclosure in social media.[49]

Conclusion

The study extends the privacy paradox research from studying predominately private sharing behavior to examining users' privacy expectations in the context of public sharing. Our research does not support the presence of a privacy paradox as we found a relationship between privacy concerns from organizational and social threats and most of the dimensions of self-disclosure (even if the relationship was weak). There was no difference between patterns of self-disclosure on private versus public accounts. In other words, users regulate their disclosure in accordance with their privacy concerns in a similar way, regardless of whether they share content using their private or public account. A broader implication of this finding is that even if information is publicly available on social media, users may still have expectation of privacy. Furthermore, we found that different privacy concerns may trigger different IPPRs and, thus, may interact with self-disclosure differently. For example, concerns about organizational threats increase accuracy and awareness while reducing amount and depth, while concerns about social threats reduce accuracy and awareness while increasing amount and depth. Although this study does not provide qualitative data to explain a peculiar relationship between social threats and the amount and depth of self-disclosure, the results broadly support the idea behind PCT that users are rational actors who recognize different privacy-related threats and adjust what and how they share information on social media accordingly. In future work, we would like to examine how different types of heuristic rules and biases that users might have[27,50] may interact with the process of risk-benefit assessment when disclosing online. Interestingly, we only found partial support for the idea that people are engaged in selective self-presentation[35] on social media to develop a socially desirable online identity.[36] Specifically, positive valence or polarity was only predicted by privacy concerns from organizational threats and only in the context of private accounts. This finding suggests that sharing information with positive valence is likely guided not just by the goal of selective self-presentation but also by other reasons, such as strengthening social ties or simply expressing one's positive internal states.[37,51] From a practical perspective, organizations should recognize that social media users with both private and public accounts are concerned with all four dimensions of CFSMIP. Social media platforms that collect personal information should develop clear data stewardship policies and practices that account for people's reticence toward third parties' unauthorized access, collection, and use of their data. If such data collection and use is happening, organizations should ensure that users' data is error free and accurate. As our research suggests, failure to address users' privacy concerns may result in users sharing less information, which, in turn, may negatively impact users' overall engagement. Since our model showed there is no perceived difference in the level of self-disclosure on both public and private accounts, organizations that rely on publicly available social media data should use the same level of privacy protection and ethical consideration as if they are handling data from private accounts. Social media platforms should also recognize that users may be concerned with the misuse of their data by other users. As our model suggests, concerns about social threats do not necessarily make people less active on social media, but they may reduce the accuracy of information shared on their public and private social media accounts. In turn, the lack of accurate information about users may reduce the usefulness of various automated recommendations and filtering features offered by most social media platforms. From a theoretical perspective, CFSMIP and CST alone are not strong explanatory variables for some dimensions of self-disclosure; additional variables should be considered in future work. For example, we need to consider not just person-based variables (such as privacy concerns) but also demographics, system-based and environmental factors.[1] Depending on the platform and users, benefits of using social media may outweigh one's privacy concerns, as such future research can embrace a uses and gratification approach to include why people use social media.[26] Finally, as this research focused on people who have both private and public accounts, our future work will analyze the privacy concerns and self-disclosure behavior of people who only have public accounts versus those with only private accounts.
Appendix Table A1.

Construct Operationalization: Self-Disclosure on Public/Private Social Media Web Sites

You indicated that one or more of your social media accounts are primarily PUBLIC/PRIVATE. When using your PUBLIC/PRIVATE account(s), to what extent do you agree with the following statements? (7-point agreement/disagreement scale)
Self-disclosure amount
 SDAm1[*] (reversed)I do not often talk about myself on social media
 SDAm2I usually talk about myself on social media for fairly long periods
 SDAm3I often discuss my feelings about myself on social media
 SDAm4I often express my personal beliefs and opinions on social media
Self-disclosure depth
 SDD1I would intimately, openly, and fully disclose who I really am in my post on social media
 SDD2I typically reveal information about myself on social media without intending to
 SDD3I often disclose intimate, personal things about myself on social media without hesitation
 SDD4When I post about myself on social media, the posts are fairly detailed
Self-disclosure positive/negative matter
 SDPN1I usually disclose positive things about myself on social media
 SDPN2I normally express my good feelings about myself on social media
 SDPN3On the whole, my disclosures about myself on social media are more positive than negative
Self-disclosure accuracy
 SDAc1My expressions of my own feelings, emotions, and experiences on social media are true reflections of myself
 SDAc2My self-disclosures on social media are completely accurate reflections of who I really am
 SDAc3My self-disclosures on social media can accurately reflect my own feelings, emotions, and experiences
 SDAc4My statements about my own feelings, emotions, and experiences on social media are always accurate self-perceptions
Self-disclosure intention
 SDI1When I express my personal feelings on social media, I am always aware of what I am doing and saying
 SDI2When I reveal my feelings about myself on social media, I consciously intend to do so
 SDI3When I self-disclose on social media, I am consciously aware of what I am revealing

Adopted from Lai and Yang.[A1]

The scale for this question is reversed.

SDAm, self-disclosure amount; SDD, self-disclosure depth; SDPN, self-disclosure positive/negative matter; SDAc, self-disclosure accuracy; SDI, self-disclosure intention.

Appendix Table A2.

Construct Operationalization: Concern About Social Threats

To what extent do you agree with the following statements (7-point agreement/disagreement scale)
Concern about social threats
 CST1I am often concerned that someone might purposefully embarrass me on social media
 CST2It often worries me that other users might purposefully write something undesired about me on social media
 CST3I am often concerned that other users might take advantage of the information they learned about me through social media

Adopted from Krasnova et al.[A2]

CST, Concern about Social Threats.

Appendix Table A3.

Construct Operationalization—Concern for Social Media Information Privacy—CFSMIP

To what extent do you agree with the following statements (7-point agreement/disagreement scale)
Collection
 COL1It usually bothers me when social media sites ask me for personal information
 COL2It usually bothers me when social media sites ask me for my current location information
 COL3It bothers me to give personal information to so many people on social media
 COL4I am concerned that social media sites are collecting too much personal information about me
Errors
 ERR1Social media sites should take more steps to make sure that personal information in their database is accurate
 ERR2Social media sites should have better procedures to correct errors in personal information
 ERR3Social media sites should devote more time and effort to verifying the accuracy of the personal information in their databases before using it for recommendations
Secondary use
 SUS1Social media sites should not use personal information for any purpose unless it has been authorized by the individuals who provide the information
 SUS2When people give personal information to social media sites for some reason, these sites should never use the information for any other purpose
 SUS3Social media sites should never share personal information with third-party entities unless authorized by the individual who provided the information
Unauthorized access
 UAC1Databases that contain personal information should be protected from unauthorized access, no matter how much it costs
 UAC2Social media sites should take more steps to make sure that unauthorized people cannot access personal information on their site
 UAC3Databases that contain personal information should be highly secured
 UAC4Social media sites should delete a user's account if they illegally access another user's personal information

Adopted from Stewart and Segars[A3] and Osatuyi.[A4]

CFSMIP, Concern for Social Media Information Privacy; COL, collection; ERR, errors; SUS, secondary use; UAC, unauthorized access.

Appendix Table A4.

Results of Internal Reliability and Convergent Validity Assessment (CFSMIP Reflective-Formative, Mode A)

Internal reliability (outer loadings; for CFSMIP, outer weights)
       SDAcSDADSDPNSDI
 COLERRSUSUACCFSMIPCSTPub.Pri.Pub.Pri.Pub.Pri.Pub.Pri.
COL10.78   0.09         
COL20.76   0.09         
COL30.80   0.09         
COL40.79   0.10         
ERR1 0.86  0.10         
ERR2 0.87  0.11         
ERR3 0.86  0.10         
SUS1  0.77 0.14         
SUS2  0.68 0.12         
SUS3  0.74 0.13         
UAC1   0.830.13         
UAC2   0.880.14         
UAC3   0.860.14         
CST1     0.91        
CST2     0.91        
CST3     0.76        
SDAc1      0.870.89      
SDAc2      0.860.89      
SDAc3      0.620.85      
SDAc4      0.820.90      
SDAm2        0.890.88    
SDAm3        0.850.84    
SDAm4        0.680.68    
SDD2        0.830.83    
SDD3        0.840.86    
SDD4        0.790.80    
SDI1            0.890.89
SDI2            0.630.85
SDI3            0.840.89
SDP1          0.610.77  
SDP3          0.990.98  

Measurement instrument after item depuration. Note 1: Internal reliability was tested by observing composite reliability (ρc), with all values higher than 0.8 across both groups (well above the threshold of 0.6). Scale reliability analysis required item depuration, as some indicators were far below the cutoff level of 0.7; four items with loadings between 0.6 and 0.7 were retrieved because their deletion did not lead to significant improvement of composite reliability or AVE, and to ensure content validity.[A5] In total, four items were deleted, and internal reliability and scale reliability were retested. Convergent validity was confirmed upon observation of AVE values, which were above the threshold of 0.5.[A6] Note 2: The second-order variable was measured following a reflective-formative approach, using Mode B for the higher order construct. Despite VIF values lower than 3.5, the path coefficient between collection and CFSMIP had a negative sign, which might be indicative of potential collinearity or suppression issues.[A7] Therefore, following Becker et al.,[A8] we used Mode A for the higher order construct, calculating correlation weights instead, and retested the model. An additional advantage of using Mode A is that correlation weights provide superior out-of-sample prediction.

AVE, average variance extracted; VIF, variance inflation factor.

Appendix Table A5.

Results of Discriminant Validity Assessment

Heterotrait-Monotrait ratio
 COLERRSUSUACCSTSDAcSDADSDPNSDI
Public         
 COL         
 ERR0.55        
 SUS0.630.54       
 UAC0.620.590.88      
 CST0.590.570.210.28     
 SDAc0.050.210.160.140.05    
 SDAD0.050.070.260.240.310.39   
 SDPN0.060.170.160.160.070.670.33  
 SDI0.110.220.380.350.050.670.150.72 
Private         
 COL         
 ERR0.55        
 SUS0.630.53       
 UAC0.620.590.88      
 CST0.590.570.210.28     
 SDAc0.050.200.200.180.06    
 SDAD0.050.070.220.220.280.29   
 SDPN0.050.200.230.220.090.720.22  
 SDI0.120.230.390.360.050.730.130.73 

Note: Based on the HTMT criterion,[A9] the results indicated discriminant validity issues between amount and depth of self-disclosure; considering that both concepts are related, they were grouped together (SDAD). After retesting, all values were lower than 0.85 except for the expected higher values between second-order and first-order constructs, and between secondary use and unauthorized access, at 0.88, which is in line with Osatuyi's results,[A4] and may also explain the analysis of CFSMIP in Mode B. Both variables were kept independent to preserve content validity and because the value was lower than the less restrictive limit of 0.90.

HTMT, Heterotrait-Monotrait ratio of correlations.

Appendix Table A6.

Results of Measurement Invariance Assessment

 Step 2Step 3
 Permutation p valuesMean (permutation p values)Variance (permutation p values)
COL
ERR
SUS
UAC
CST0.90
SDAc0.350.040.66
SDAD0.520.130.45
SDPN0.580.410.82
SDI0.080.790.58

Note: Multigroup analysis requires confirming measurement invariance across groups. The choice of the same constructs and indicators ensures configural invariance. The analysis includes a MICOM test[A10] with 5,000 permutations to test compositional and scalar invariance (Table A6). The results of step 2 of the MICOM test showed no significant difference across groups. However, step 3 of MICOM showed significant differences in the means of self-disclosure accuracy, and thus scalar invariance was not ensured. Given that partial measurement invariance was established, multigroup analysis is possible.

MICOM, measurement invariance of composite models.

Appendix Table A7.

Results of Structural Model Assessment and Multigroup Analysis

 PublicPrivatePLS-MGA
 βf2βf2βdiffp
COL→CFSMIP0.29[**]0.29[**]0.000.52
ERR→CFSMIP0.27[**]0.27[**]0.000.53
SUS→CFSMIP0.34[**]0.34[**]0.000.47
UAC→CFSMIP0.34[**]0.34[**]0.000.49
CFSMIP→SDAc0.18[**]0.030.22[**]0.040.040.30
CFSMIP→SDAD−0.30[**]0.09−0.28[**]0.080.020.36
CFSMIP→SDPN0.18[a]0.030.22[**]0.050.050.33
CFSMIP→SDI0.33[**]0.100.36[**]0.120.030.35
CST→SDAc−0.10[*]0.01−0.14[**]0.020.030.69
CST→SDAD0.40[**]0.160.37[**]0.130.030.74
CST→SDPN−0.04[a]0.00−0.08[a]0.010.040.63
CST→SDI−0.15[**]0.02−0.17[**]0.030.020.63

Note: The VIF values are below 3 in all cases (except for SDAc4, at 3.23 in the private group); therefore, the results discard potential collinearity issues. The values of R[2] are relatively low (0.03–0.16) with higher variance explained of self-disclosure amount and depth, and intent. Furthermore, the SRMR may indicate a poor fit (between 0.097 and 0.128 for the saturated and estimated models, respectively), which suggests that the model might not be sufficient to explain self-disclosure behaviors in private or public social media platforms. Finally, a blindfolding procedure with a distance omission of 7 returns positive values of Q[2], which confirms the predictive relevance of the model.

ns, nonsignificant.

p < 0.05; **p < 0.01.

PLS-MGA, partial least squares multigroup analysis.

  3 in total

1.  Assessing the Influencing Factors of Electronic Word-of-Mouth on CSR Issues. A Case of Hospotality Service Industry of China.

Authors:  Zhuo Liu; Suihuai Yu; Fangmin Cheng; Rida Waheed
Journal:  Front Psychol       Date:  2022-06-21

2.  Selectivity in posting on social networks: the role of privacy concerns, social capital, and technical literacy.

Authors:  Hadas Schwartz-Chassidim; Oshrat Ayalon; Tamir Mendel; Ron Hirschprung; Eran Toch
Journal:  Heliyon       Date:  2020-02-04

3.  Manipulation and Malicious Personalization: Exploring the Self-Disclosure Biases Exploited by Deceptive Attackers on Social Media.

Authors:  Esma Aïmeur; Nicolás Díaz Ferreyra; Hicham Hage
Journal:  Front Artif Intell       Date:  2019-11-29
  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.