A large number of online interaction and sharing of personal information on social media networking sites has raised new privacy issues. This is said to be due to online users’ lack of privacy concerns, thus promoting online self-disclosure in social media. Against this concern, this paper will provide a conceptual understanding on the predictor towards online self-disclosure, which is privacy concerns among the users. According to the summary of literatures, it is hypothesized that privacy concerns will hamper self-disclosure online. Based on the proposed framework, propositions are formulated as a basis for the study that will follow.

1.
V.
Tuunainen
,
O.
Pitkänen
, and
M.
Hovi
, in 22nd Bled EConference (
Bled
,
Slovenia
,
2009
).
2.
R.
Gross
,
A.
Acquisti
, and
H.J.
Heinz
,
in WPES'05 Proc. 2005 ACM Work. Priv. Electron. Soc
. (
ACM Press
,
New York, Alexandria, VA
, 7 November, 2005), pp.
71
80
.
3.
W.Y.
Lin
,
X.
Zhang
,
H.
Song
, and
K.
Omori
,
Comput. Human Behav.
56
,
289
(
2016
).
4.
K.
Li
,
X.
Wang
,
K.
Li
, and
J.
Che
,
Nankai Bus. Rev. Int.
7
,
282
(
2016
).
5.
F.
Bélanger
and
R.E.
Crossler
,
MIS Q. Manag. Inf. Syst.
35
,
1017
(
2011
).
6.
W.
Hong
and
J.Y.L.
Thong
,
MIS Q. Manag. Inf. Syst.
37
,
275
(
2013
).
7.
J.
Smith
,
S.J.
Milberg
, and
S.J.
Burke
,
MIS Q.
Manag
.
Inf. Syst.
20
,
167
(
1996
).
8.
S.
Stieger
,
C.
Burger
,
M.
Bohn
, and
M.
Voracek
,
Cyberpsychology, Behav. Soc. Netw.
(
2013
).
9.
M.
Tsay-vogel
,
J.
Shanahan
, and
N.
Signorielli
,
New Media Soc.
20
,
141
(
2018
).
10.
I.
Altman
, The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding (
Brooks/Cole Pub. Co
.,
1975
).
11.
T.
Dinev
and
P.
Hart
,
Int. J. Electron. Commer.
10
,
7
(
2006
).
12.
H.
Krasnova
,
O.
Günther
,
S.
Spiekermann
, and
K.
Koroleva
,
Identity Inf. Soc.
2
,
39
(
2009
).
13.
H.
Krasnova
,
E.
Kolesnikova
, and
O.
Günther
,
in 15th Am. Conf. Inf. Syst. 2009, AMCIS 2009
(
2009
), pp.
2559
2567
.
14.
A.
Malik
,
K.
Hiekkanen
,
A.
Dhir
, and
M.
Nieminen
,
J. Information, Commun. Ethics Soc.
14
,
364
(
2016
).
15.
T.
Buchanan
,
C.
Paine
,
A.N.
Joinson
, and
U.D.
Reips
,
J. Am. Soc. Inf. Sci. Technol.
58
,
157
(
2007
).
16.
P.A.
Pavlou
,
L.
Huigang
, and
X.
Yajiong
,
MIS Q. Manag. Inf. Syst.
31
,
105
(
2007
).
17.
18.
A.
Koohang
,
J.
Paliszkiewicz
, and
J.
Goluchowski
,
Ind. Manag. Data Syst.
118
,
1209
(
2018
).
19.
T.
Alashoor
,
S.
Han
, and
R.C.
Joseph
,
Commun. Assoc. Inf. Syst.
41
,
62
(
2017
).
20.
Y.
Sun
,
S.
Fang
, and
Y.
Hwang
,
Sustain.
11
, (
2019
).
21.
M.J.
Keith
,
J.S.
Babb
,
P.B.
Lowry
,
C.P.
Furner
, and
A.
Abdullat
,
Inf. Syst. J.
25
,
637
(
2015
).
22.
N.K.
Malhotra
,
S.S.
Kim
, and
J.
Agarwal
,
Inf. Syst. Res.
15
,
336
(
2004
).
23.
A.
Ali
,
A.
Kamran
,
M.
Ahmed
,
B.
Raza
, and
M.
Ilyas
,
Int. J. Adv. Comput. Sci. Appl.
10
, (
2019
).
24.
T.
Xin
,
Q.
Li
,
K.
Yongbeom
, and
H.
Jeffrey
,
Internet Res.
22
,
211
(
2012
).
25.
H.
Krasnova
,
S.
Spiekermann
,
K.
Koroleva
, and
T.
Hildebrand
, J.
Inf. Technol.
25
,
109
(
2010
).
26.
F.
Xu
,
K.
Michael
, and
X.
Chen
,
Electron. Commer. Res.
13
,
151
(
2013
).
27.
F.
Stutzman
,
R.
Gross
, and
A.
Acquisti
,
J. Priv. Confidentiality
4
, (
2013
).
28.
M.
Madden
and
A.
Smith
,
Pew Res. Cent.
(
2010
).
29.
30.
M.
Anderson
and
J.
Jiang
,
Teen's Social Media Habits and Experiences
(
2018
).
31.
G.
Fergie
,
K.
Hunt
, and
S.
Hilton
,
Soc. Sci. Med.
170
,
46
(
2016
).
33.
M.
Madden
,
A.
Lenhart
,
S.
Cortesi
,
U.
Gasser
,
M.
Duggan
,
A.
Smith
, and
M.
Beaton
,
Teens, Social Media, and Privacy
(
2013
).
34.
A.L.
Young
and
A.
Quan-Haase
,
Inf. Commun. Soc.
16
,
479
(
2013
).
35.
A.E.
Waldman
,
SSRN Electron. J.
69
,
559
(
2015
).
36.
S.
Livingstone
,
M.
Stoilova
, and
R.
Nandagiri
,
Media Commun.
1
(
2019
).
37.
K.
Demetzou
,
L.
Böck
, and
O.
Hanteer
,
Smart Bears Don't Talk to Strangers: Analysing Privacy Concerns and Technical Solutions in Smart Toys for Children
(
2018
).
38.
A.
Acquisti
,
L.
Brandimarte
, and
G.
Loewenstein
,
Science (80-.
).
347
,
509
(
2015
).
39.
C.
Fiesler
,
M.
Dye
,
J.L.
Feuston
,
C.
Hiruncharoenvate
,
C.J.
Hutto
,
S.
Morrison
,
P.R.
Khanipour
,
U.
Pavalanathan
,
A.S.
Bruckman
,
M.
De Choudhury
, and
E.
Gilbert
,
in Proc. 2017 ACM Conf. Comput. Support. Coop. Work Soc. Comput
. (
ACM
,
New York, NY, USA
,
2017
), pp.
567
580
.
40.
A. Nurul
Ain
and
O.
Nooraini
,
JOSTIP
5
,
1
(
2019
).
41.
J.J.
Turner
and
P.S.
Amirnuddin
,
SEARCH (Malaysia)
10
,
31
(
2018
).
42.
G.
Bansal
,
F.M.
Zahedi
, and
D.
Gefen
,
Decis. Support Syst.
49
,
138
(
2010
).
43.
L.N.
Zlatolas
,
T.
Welzer
,
M.
Hölbl
,
M.
Heričko
, and
A.
Kamišalić
,
Entropy
21
, (
2019
).
44.
A.
Acquisti
and
R.
Gross
, in 6th Work. Priv. Enhancing Technol. (
Robinson College, Cambridge University
,
UK
,
2006
).
45.
Z.
Tufekci
,
Bull. Sci. Technol. Soc.
28
,
20
(
2008
).
46.
D.
O'Brien
and
A.
Torres
,
Irish J. Manag.
31
, (
2012
).
47.
E.K.
Clemons
,
J.
Wilson
, and
F.
Jin
,
in Proc. Annu. Hawaii Int. Conf. Syst. Sci.
(
2014
), pp.
4083
4092
.
48.
G.
Bansal
,
F.M.
Zahedi
, and
D.
Gefen
,
Inf. Manag.
53
,
1
(
2016
).
49.
H.
Krasnova
,
E.
Kolesnikova
, and
O.
Günther
,
in 18th Eur. Conf. Inf. Syst. ECIS 2010
(
2010
).
50.
We Are Social and Hootsuite
, (
2021
).
51.
C.
Mutimukwe
,
E.
Kolkowska
, and
Å.
Grönlund
,
Gov. Inf. Q.
37
,
101413
(
2020
).
52.
F.
Hampson
and
D.
Bricker
, Global Survey on Internet Security and Trust (
Centre for International Governance Innovation (CIGI)-IPSOS
,
2018
).
53.
P.F.
Wu
,
J. Assoc. Inf. Sci. Technol.
70
,
207
(
2019
).
54.
H.R.
Lipford
,
P.
Wisniewski
,
C.
Lampe
,
L.
Kisselburgh
, and
K.
Caine
,
in Proc. ACM Conf. Comput. Support. Coop. Work. CSCW
(
2012
), pp.
19
20
.
55.
M.
Taddicken
,
J. Comput. Commun.
19
,
248
(
2014
).
56.
J.
Smith
,
T.
Dinev
, and
H.
Xu
,
MIS Q. Manag. Inf. Syst.
35
,
989
(
2011
).
57.
S.
Barth
and
M.D.T.
de Jong
,
Telemat. Informatics
34
,
1038
(
2017
).
58.
59.
D.
Boyd
and
E.
Hargittai
,
First Monday
15
, (
2010
).
60.
Y.
Ma
,
in Int. Conf. Inf. Inf. Contemp. Soc.
(
2019
), pp.
799
805
.
61.
C.H.
Yeh
,
Y.S.
Wang
,
S.J.
Lin
,
T.H.
Tseng
,
H.H.
Lin
,
Y.W.
Shih
, and
Y.H.
Lai
,
Online Inf. Rev.
42
,
923
(
2018
).
62.
M.J.
Culnan
and
R.J.
Bies
,
J. Soc. Issues
59
,
323
(
2003
).
63.
C.M.
Angst
and
R.
Agarwal
,
MIS Q. Manag. Inf. Syst.
33
,
339
(
2009
).
64.
H.
Li
,
R.
Sarathy
, and
H.
Xu
,
J. Comput. Inf. Syst.
51
,
62
(
2010
).
65.
T.
Dinev
and
P.
Hart
,
Inf. Syst. Res.
17
,
61
(
2006
).
66.
N.
Barrett-Maitland
and
J.
Lynch
,
in Secur. Priv. Under a Leg. Ethical Tech. Perspect.
(
2020
).
67.
T.
Dinev
,
H.
Xu
,
J.
Smith
, and
P.
Hart
,
Eur. J. Inf. Syst.
22
,
295
(
2013
).
69.
T.
Wang
,
T.D.
Duong
, and
C.C.
Chen
,
Int. J. Inf. Manage.
36
,
531
(
2016
).
This content is only available via PDF.
You do not currently have access to this content.