Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding

نویسندگان

  • Ben C. F. Choi
  • Zhenhui Jiang
  • Bo Xiao
  • Sung S. Kim
چکیده

O social networks greatly facilitate social exchange among friends. At times, for amusement, individuals may be targeted by friends’ playful teases, which often involve exposing individuals’ private embarrassing information, such as information that reveals their past indecent behavior, mischief, or clumsiness. Although individuals sometimes do enjoy the humor, they might also be offended by the involuntary exposure. Drawing on social exchange theory, this paper elucidates the consequences of an embarrassing exposure in online social networks. Specifically, this study examines the effects of information dissemination and network commonality on individuals’ exchange assessment as well as how this assessment shapes their behavioral responses. The results of our experiment provide strong evidence that information dissemination and network commonality jointly influence individuals’ perceived privacy invasion and perceived relationship bonding. In addition, whereas perceived privacy invasion increases transactional avoidance, it reduces approach behavior. Furthermore, whereas perceived relationship bonding impedes both transactional avoidance and interpersonal avoidance, it leads to approach behavior. The theoretical and practical implications of the findings are discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding Forthcoming Information Systems Research

Online social networks greatly facilitate social exchange among friends. At times, for amusement, individuals may be targeted by friends’ playful teases, which often involve exposing individuals’ private embarrassing information, such as information that reveals their past indecent behavior, mischiefs, as well as clumsiness. While individuals sometimes do enjoy the humor, they might also be off...

متن کامل

Analysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks

Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...

متن کامل

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

A Sudy on Information Privacy Issue on Social Networks

In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Information Systems Research

دوره 26  شماره 

صفحات  -

تاریخ انتشار 2015