Professional Documents
Culture Documents
Impact of User Awareness, Trust, and Privacy Concerns On Sharing Personal Information On Social Media
Impact of User Awareness, Trust, and Privacy Concerns On Sharing Personal Information On Social Media
00 ©2018 IEEE
V alentinus Param arta, M uh am m ad Jihad, A rdhian Dharm a, Ika C handra H apsari, Puspa Indahati Sandhyaduhita and
A chm ad N izar Hidayanto
Department o f Computer Science
University of Indonesia
Depok, Indonesia
valentinus.paramarta81@ui.ac.id, muhammad.jihad71@ui.ac.id, ardhieui.dharma@ui.ac.id, ika.c@cs.ui.ac.id,
p.indeihati@cs.ui.ac.id, euid nizar@cs.ui.ac.id
Abstract—Facebook, Twitter, and Instagram are the most presented by “We Are Social” in April 2018, Indonesia had the
often and most widely used social-media sites, especially in third most Facebook users among all nations, with 140 million
Indonesia. The number of social-media users is increasing every users; the country ranked fourth in Instagram users, with 56
year, accompanied by increased risks. One of those risks is to the million, and ranked 12th in Twitter users, with 6.6 million [4],
security and privacy of users, as shown by the user-data leak
experienced by Facebook in 2018. These issues led the authors to In addition to its positive impact, social media can also
conduct research relating to the influence of privacy concerns, cause insecurity for its users. Unwise use of social media can
trust, and user awareness on the readiness to share personal lead to risks to the user and to the community. Even for large
information via social-media sites. A research model was social media sites, ex. Facebook, security-related issues and the
developed based on several hypotheses. The research model was data privacy of users are still primary concerns. In 2018,
confirmed, and experiment was conducted from 340 social-media Facebook experienced a leak of user data [5], The case raised
users through a questionnaire-based online survey over a period awareness of privacy and security because people are
of 2 months. To confirm the structural model used in this increasingly accustomed to using social media to share
research, reliability and validity analyses were performed. personal information [6],
Structural equation model (SEM) analysis was used to detect
relationships among constructs in the research model. The results The majority of privacy research has focused on individual
of this research show that user awareness, trust, and privacy factors such as risk [7], trust [8], or controllability [6,9].
concerns have a positive and significant effect on sharing Interestingly, there is still limited research investigating the
personal data on social media. Then we discussed the role of privacy concerns and user awareness as an explanatory
implications of our results for policy-making, practice, and future factor for users’ willingness to share information on social-
research. media sites, although several studies have revealed that privacy
concerns and user awareness have important roles for social-
Keywords—-facebook, twitter, instagram, privacy concern, trust, media users in sharing their personal information [2,10]. This
user awareness, social media research gap is not the only concern. For social-media users,
many privacy, security, awareness, and trust issues need to be
I. In t r o d u c t i o n addressed. First, user information, including multimedia data,
The number of active social-media users increases every can be seized and illegally used by evil actors and third-party
year, making social media a powerful data-generating platform organizations for escalating their revenue. Second, the personal
for exploring ongoing trends [1]. The phenomenon of data shared in users’ profiles can lead to risks such as cyber
interaction on social-media sites is not limited to teenagers harassment, online stalking, and theft. Third, some of the
looking for more popularity or introverts trying to make significant features of social media, such as tagging, picture-
friends; social-media sites have touched all age groups, sharing, and commenting, make their personal information
providing an open medium for enriching users lives with more visible and accessible to public [11,12], Contribution of
barrier-free communication and for marketing or advertising the author in this study is to provide an overview of factors that
their products [2]. could influence privacy issues on social-media sites and give a
suggestion for developing relevant privacy policies on social-
Data from Asosiasi Penyelenggara Jasa Internet Indonesia media sites [6], This paper will focus on the impact of
(APJII) show that, in 2017, 143 million Indonesians have used awareness, trust, and privacy concerns on user’s willingness to
the Internet in their daily lives, of whom 98% use the Internet share personal data on social-media sites. The main research
to access social-networking services [3]. According to data question (RQ) of this study is:
271
Authorized licensed use limited to: University of Technology Jamaica. Downloaded on April 09,2021 at 01:16:02 UTC from IEEE Xplore. Restrictions apply.
ICACSIS 2018 978-l-7281-0135-4/18/$31.00 ©2018 IEEE
RQ: What is the effect of awareness, trust, and security on the
willingness to share personal information?
II. Re l a t e d W o r k
272
Authorized licensed use limited to: University of Technology Jamaica. Downloaded on April 09,2021 at 01:16:02 UTC from IEEE Xplore. Restrictions apply.
ICACSIS 2018 978-1-7281-0135-4/18/S31.00 ©2018 IEEE
TABLE I. De m o g r a ph ic s of Re s po n d e n t s TABLE II. Va l id it y Te s t
Online questionnaire based on the framework was used to Information Sharing 0.778
obtain the data. These data were used to test our research in a period o f two months, providing all the data used in this
framework. An online questionnaire was conducted from study. The demographics of the collected data has been shown
February 2018 to April 2018. To maximize the response, we in Table I.
also used email and messenger apps as tools.
B. Validity and Reliability Analysis
B. Tool and Methods
Validity was tested in this research using the bivariate
Validity and reliability analysis was done using SPSS 25.0. Pearson-test method. The value o f r table used in this study is
Valid means that the instrument can be used to measure what it 0.106. The result o f the validity test is shown in Table II, where
purports to measure [20] [21], while a reliable instrument is the fields of privacy, trust, user awareness, and information
one that, when used multiple times to measure the same object, sharing are labeled PC, T, AW, and IS, respectively. As may
will produce the same output [22]. The result obtained in the be seen in Table n , the calculated r value obtained from all
analysis of reliability is the value of Cronbach’s alpha. indices tested has a value greater than the r-table value. This
Cronbach’s alpha (a), provides an internal-consistency indicates that all constructs used in this research are valid.
measure of a scale to test the internal consistency of the
questionnaire [2] [23]. The structural equation modeling (SEM) Cronbach’s alpha (a) was used as a reference to determine
technique was used to identify the connection between the level o f reliability of the construct. The Cronbach’s alpha
constructed model and explain the causes and effects between value generated in the reliability test should be greater than
variables. The SEM model was created by AMOS 24.0. 0.60, based on the standard value [24]-[27]. Table III shows the
value o f Cronbach’s alpha of the measured constructs of the
research framework. It was found that the Cronbach’s alpha
V. Re su l t s
values obtained from all tested constructs were above 0.60
A. Profile o f Respondents (Table III). This shows that all the constructs used in this
research are acceptable for the study.
The online questionnaire was distributed via email and
messenger application. A total of 340 responses were collected
273
Authorized licensed use limited to: University of Technology Jamaica. Downloaded on April 09,2021 at 01:16:02 UTC from IEEE Xplore. Restrictions apply.
ICACSIS 2018 978-1-7281-0135-4/18/S31.00 ©2018 IEEE
TABLE IV. F i t INDICES FOR THE MEASUREMENT MODELS TABLE V. Su m m a r y of Hy po t h e s is Te s t
site. This result aligns with previous study by Kayes et al. [16]. The aim of this study was to investigate the impact of
privacy concerns, user awareness, and trust on individual
The hypothesis H2 shows a value of p = -0.99 and p =
willingness to share personal data on social media. Analyzing
0.000, which supports hypothesis H2. This indicates that an
the survey data show some interesting findings: In terms of
individual’s increasing awareness o f the importance of
information-sharing, privacy concerns and trust have a positive
maintaining privacy and security on social-media sites will
impact on willingness to share information on social-media
reduce the individual’s willingness to share information, as the
sites. This shows that if users believe the function of social
individual will be more careftd in using the Internet, especially
media sites to protect their data and have strong concerns about
social media [19],
privacy protection, they tend to share more information [14],
Hypothesis H3 shows a value of P = 0.103 and p = 0.005, Furthermore, a negative impact was found for user awareness
supporting hypothesis H3. In line with a previous study [23], on the willingness to share information. The results indicate
the results indicate that when users have high confidence in the that when user awareness increases, user willingness to share
ability of the social-media provider (Facebook, Twitter, or information decreases. According to research by Jeong et al.
Instagram) to protect the privacy and security o f their account, [6], if a user is cautious about their privacy settings, the users
will prefer to impose strong restrictions on who has access to
274
Authorized licensed use limited to: University of Technology Jamaica. Downloaded on April 09,2021 at 01:16:02 UTC from IEEE Xplore. Restrictions apply.
ICACSIS 2018 978-l-7281-0135-4/18/$31.00 ©2018 IEEE
whether to share personal information [6], to prevent the
excessive sharing of personal information by users. We
recommend that the public be skeptical and cautious in every
activity and interaction on the Internet, specifically on social
media. It is possible to be realistic and mature, so that the
information given is not detrimental to users [32], We
encourage users to be careful in sharing their location
information on social media, to prevent potential criminal
behavior, and to untag photos immediately if a user who
downloaded a photo is not recognized.
V II. Co n c l u s io n a n d Lim it a t io n s
The results also show that user awareness has a significant For future research, this study provides a several
impact on user privacy concerns. These results correspond to suggestions. First, as discussed above, we suggest expanding
those o f a previous study by Tuunainen et al. [19], which the current study and used non-government employees or non-
showed that if the user’s privacy awareness increases, the user student samples, varying the types of information sharing, and
will tend to maximize the privacy features that have been examining different social-media types could take advantage of
provided by social-media sites, which may result in more the diversity of economic levels in the several regions of
careful behavior in the social-media environment. The research Indonesia. Second, for the future research it would be good if
model was fully supported; the factors of privacy concerns, adding several other factors that may influence user willingness
trust, and user awareness affected the willingness to share to share information on social-media sites.
information on social media. Furthermore, we found that the
perceived of privacy concerns and user awareness is positively Ac k no w l edg ment
associated on trust in the ability o f Facebook, Twitter, or This research was supported by PITTA Grand Universitas
Instagram to protect user privacy. Indonesia. Contract number: 1863/UN2.R3.1/HKP.05.00/2018.
This research has implications for companies and
governmental institutions. We suggest applying guidelines or Re f e r e n c e s
Standard Operating Procedures (SOPs) aimed at limiting the [1] S. Kemp, "DIGITAL IN 2017: GLOBAL OVERVIEW," 24 January
amount of personal or corporate information present in the 2017. [Online]. Available: https://wearesocial.com/special-
social-media accounts of users to prevent the intentional or reports/digital-in-2017-global-overview. [Accessed 14 May 2018],
unintentional leaking o f corporate data by workers through [2] S. Dhawan, K Singh and S. Ghoel, “Impact of privacy attitude, concern
their social-media accounts. and awareness on use of online social networking,” 2014 5th
International Conference - Confluence The Next Generation Information
For social-media companies, we recommend that, if Technology Summit (Confluence), pp. 14-17,2014.
possible, users be given a choice of mechanisms for deciding
275
Authorized licensed use limited to: University of Technology Jamaica. Downloaded on April 09,2021 at 01:16:02 UTC from IEEE Xplore. Restrictions apply.
ICACSIS 2018 978-1-7281-0135-4/18/S31.00 ©2018 IEEE
[3] I. A. Afandi, A. Kusyanti and N . H. Wardani, “Analisis Hubungan [16] I. Kayes, N . Kourtellis, F. Bonchi, and A. Iamnitchi, “Privacy Concerns
Kesadaran Keaxnanan, Privasi Informasi, dan Perilaku Keamanan Pada vs. U ser Behavior in Community Question Answering,” 2015
Para Pengguna Media Sosial Line,” J. Peng. Tek. Infor. II. Kom., vol. 1, IEEE/ACM ASONAM , pp .681-688,2015.
no. 9, pp. 783-792, September 2017. [17] A. A. Hossain and W. Zhang, “Privacy and Security Concern o f Online
[4] S. Kemp, “2018 Q2 Global Digital Statshot,” 2018. [Online]. Available: Social Networks from User Perspective,” 2015 ICISSP, pp. 246-253,
https://wearesocial.com/blog/2018/04/social-media-use-jumps-in-ql- 2015.
despite-privacy-fears. [A ccessed 19 M ay 2018]. [18] Ajzen, leek. “The Theory o f Planned Behavior,” Organizational
[5] D. Ingram, "Facebook says data leak hits 87 million users, widening behavior and human decision processes, 50.2, pp. 179-211,1991.
privacy scandal," Reuters, 4 April 2018. [Online]. Available: [19] V . K Tuunainen, O. Pitkanen, and M. Hovi, “U sers’ Awareness o f
https://www.reuters.com/article/us-facebook-privacy/facebook-says- Privacy on Online Social Networking Sites — Case Facebook,” 22nd
data-leak-hits-87-million-users-widening-privacy-scandal- Bled eConference eEnablement: Facilitating an Open, Effective and
idU SK C NlH B2C M . [Accessed 14 M ay 2018]. Representative eSociety, 2009.
[6] Y . Jeong and Y . Kim, “Privacy Concern on Social Networking Sites: [20] S. Batool, “D eveloping Organizational Commitment and Organizational
Interplay A m ong Posting Types, Content, and Audiences,” Comput. Justice to A m plify Organizational Citizenship Behavior in Banking
Human Behav., vol. 69, pp. 3 0 2 -310,2017. Sector,” Pakistan Journal o f Commerce & Social Sciences, vol. 7, pp.
[7] M. Kugler, S. Smolnik, and P. Raeth, “Determining the Factors 646-655,2013.
Influencing Enterprise Social Software Usage: Development o f [21] Available at: http://www.ats.ucla.edu/stat/stata/whatstat/shatstathtm.
Measurement Instrument for Empirical Assessment,” in HICSS ’13
[22] Sugiyono, “M etode Penelitian B isnis,” CV ALFABETA, 2000.
Proc., 2013, pp. 3635-3644.
[23] C. Dwyer, S. Hiltz, and K. Passerini, ‘T rust and Privacy Concern Within
[8] G. Harden, “Knowledge Sharing in the Workplace: A Social Networking
Social Networking Sites: A Comparison o f Facebook and M ySpace,” in
Site A ssessm ent,” in HICSS ’12 Proc., 2012, pp. 3888-3897.
AMCIS, 2007.
[9] P. Raeth and S. Smolnik, “Antecedents and Consequences o f Corporate
[24] SPSS for Windows step b y step: A simple guide and reference.
W eblog U sage in the Intranet: A Process Perspective,” in HICSS ’10
Proc. 2010, pp. 1-10. [25] T. D inev and P. Hart, “A n Extended Privacy Calculus M odel for e-
Commerce Transactions,” Information System Research, vol. 17, no. 1,
[10] R. Buettnet, “Analyzing the Problem o f Employee Interal Social
pp. 9 0 -9 8,2010.
Network Site Avoidance: Are Users Resistant due to Their Privacy
Concern?,” 2015 48th Hawaii International Conference on System [26] J. F. Hair, et al., “Multivariate Data Analysis,” 7nd edition, N ew Jersey:
Sciences, pp. 1819-1828,2015. Pearson Education Inc, 2010.
[11] R. Gross, A . Acquisti, and H. J. H. Ill, “Information revelation and [27] Z. Matondang, “Validitas dan Reliabilitas Suatu Instrumen Penelitian,”
privacy in online social networks,”in WPES, pp. 7 1 -80,2005. Jumal Tabularasa, vol. 6, pp. 8 7 -9 7,2009.
[12] S. Rathore, P. K. Sharma, V . Loia, Y . S. Jeong, J. H. Park, “Social [28] D. lacobucci, “Strucutural Equation Modeling: Fit indices, sample size,
network security: Issues, challenges, threats, and solutions,” Information and advanced topics,” Journal o f Consumer Psychology, vol. 20, no. 1,
Sciences, vol. 421, pp. 43-69. pp. 9 0 -9 8,2010.
[13] C. M. K Cheung, P. Y . Chiu, and M . K. O. Lee, “Online Social [29] F. H. Chandio, “Studying Acceptance o f Online Banking Information
Networks: W hy do students use facebook?,” Comput. Human Behav., System: A Structural Equation M odel,” Thesis: Brunei Business School,
vol. 27, no. 4, pp. 1337-1343,2011. 2011.
[14] A. Dhami, N . Agarwal, T. K Chakraborty, B . P. Singh, and J. Minj, [30] Z. I. Saleh and A. Mashhour, “Evaluating Security Awareness Impact on
“Impact o f Trust, Security and Privacy Concern in Social Networking: Perceived Risk and Trust: The Case o f Social Networks,” International
An Exploratory Study to Understand the Pattern o f Information Journal in IT and Engineering, vol. 4, pp. 9 9 -110,2016.
Revelation in Facebook,” 3rd IEEE IACC, pp. 465-469,2013. [31] F. Califato, F. Lanubile and F. Sportelli, “Can Social Awareness Foster
[15] H. K Tsoi and L. Chen, “From Privacy Concern to U ses o f Social Trust Building in Global Software Teams?,” in Proceedings SSE, pp. 13-
Network Sites: A Cultural Comparison via U ser Survey,” 2011 IEEE 1 6 ,2013.
Third International Conference on Privacy, Security, Risk and Trust and [32] H. P. Yuwianto, “Kebijakan Informasi dan Privacy”, Artikel Universitas
2011 IEEE Third Intemationd al Conference on Social Computing, pp. Airlangga, 2012.
457-464,2011.
276
Authorized licensed use limited to: University of Technology Jamaica. Downloaded on April 09,2021 at 01:16:02 UTC from IEEE Xplore. Restrictions apply.