DOI QR코드

DOI QR Code

Effects of Self-Presentation and Privacy Concern on an Individual's Self-Disclosure : An Empirical Study on Twitter

자기표현욕구와 개인정보노출우려가 자기노출의도에 미치는 영향 : 트위터를 중심으로

  • Received : 2011.12.15
  • Accepted : 2012.05.30
  • Published : 2012.07.31

Abstract

While feeling anxious about the risk of exposure of personal information and privacy, users of microblogs and social network services are continuously using them. This study aims to develop a model to investigate this phenomenon. Specifically, this study explores the relationship between personal characteristics (represented by privacy concern and self-presentation) and an individual's self-disclosure. An individual's personal belief (represented by perceived risk and perceived trust) is also tested as an mediator between the relationship. Through a questionnaire survey to 183 twitter users in Korea, the results indicate that self-presentation has a direct influence on self-disclosure as well as an indirect influence through perceived trust. In contrast, privacy concern has not a direct but an indirect negative influence on self-disclosure through perceived risk. In conclusion, self-presentation has a stronger influence on self-disclosure then privacy concern to Twitter users. An individual who has a higher propensity for self-presentation will form a stronger perceived trust on Twitter, which in turn, affects the individual's self-disclosure. On the other hand, an individual who is more concerned with personal privacy will feel more serious about perceived risk, which in turn, negatively influences one's perception of the trust in Twitter as well as his desire for self-disclosure.

Keywords

References

  1. 고 준, 신선진, 김희웅, "온라인 커뮤니티에서 자기표현욕구의 영향요인과 디지털 아이템 구매의도에 미치는 효과", 경영정보학연구, 제18권, 제1호(2008), pp.118-144.
  2. 글렌카로, 남수현, 강신철, 송희석, "Effects of Privacy Concern o Trust and Intention to Incremental Usage of Social Networking Systems", 디지털정책연구, 제6권, 제4호(2008), pp.123-135.
  3. 김교헌, 한덕웅, "자기노출의 목표, 자발성 및 분노억제경향이 생리적 각성, 정화 및 평가에 미치는 효과", 한국심리학회지:건강, 제1권 제1호(1996), pp.66-88.
  4. 김연정, "한국형 블로그 이용자의 가치체계에 관한 연구", 광고연구, 제68권(2005), pp.9-35.
  5. 김유정, "웹 개인미디어에서의 사이버 자기표현", 한국언론학보, 제52권, 제6호(2008), pp. 78-99.
  6. 메디컬투데이, "네티즌 54% SNS 이용시 개인정보노출우려", 2010.
  7. 사람인, "SNS 사용자 54%, 불안감 느껴", 2010.
  8. 손영란, 박은아, "자기노출 및 대인관계성향에 따른 인터넷 커뮤니티 활동의 차이", 미디어, 젠더와 문화, 제15권(2010), pp.157-284
  9. 신지영, 양희동, "온라인 커뮤니티기반 블로그 활동에 영향을 미치는 프라이버시 정보의 유형과 조절변수 연구, 경영학연구, 제35권, 제1호(2006), pp.81-108.
  10. 오이코랩 트위터통계 사이트(2011), http://twitter.com/oikolab.
  11. 이두희, 임승희, "블로그 이용자의 자발적 자기 정보공개의 동기요인과 결과요인에 관한 연구", 광고학연구, 제17권, 제5호(2006), pp.227-240.
  12. 이은미, 박현희, 전중옥, "인터넷 쇼핑몰의 이용자 특성이 상호작용성, 신뢰, 재이용의도에 미치는 영향", 마케팅논집, 제17권, 제3호(2009), pp.83-110.
  13. 이재신, 연보영, "미니홈페에서 나타나는 대학생들의 자기노출 및 이에 영향을 주는 요인들에 관한 연구", 한국언론학보, 제52권, 제3호 (2008), pp.99-121.
  14. 최혁라, 신정신, "온라인 거래에서 프라이버시 염려의 선행요인과 프라이버시 염려, 신뢰간의 관계에 관한 연구", 정보시스템연구, 제16권 제3호(2007), pp.21-44.
  15. 한국인터넷진흥원, "2010년 인터넷 이용실태 조사", 2010.
  16. Ajzen, I., "The Theory of Planned Behavior," Organ, Behavior Human Decision Processes, Vol.50(1991), pp.179-211. https://doi.org/10.1016/0749-5978(91)90020-T
  17. Archer, R.L., Role of personality and social situation. In G.J. Chelune(Ed.), Jossey-Bass, San Francisco, 1979.
  18. Bagozzi, R.P. and Y. Yi, "On the Evaluation of Structural Equation Models," Journal of the Academy of Marketing Science, Vol.16, No.2(1988), pp.74-94. https://doi.org/10.1007/BF02723327
  19. Bauer, R.A., "Consumer Behavior as Risk Taking," 43rd Conference of American Marketing Association, Chicago, (1960), pp.389-398.
  20. Bauer, H.H., M. Grether, and M. Leach, "Building customer relations over the internet," Industrial Marketing Management, Vol.31 (2002), pp.155-163. https://doi.org/10.1016/S0019-8501(01)00186-9
  21. Boyd, D.M. and N.B. Ellison, "Social network sites:Definition, History, and Scholarship," Journal of Computer Mediated Communication, Vol.13, No.1(2007), pp.210-230. https://doi.org/10.1111/j.1083-6101.2007.00393.x
  22. Brendan, M., J. Tam, P.G. Kelley, and L.F. Cranor, "RT@IWantPrivacy:Widespread Violation of Privacy Settings in the Twitter Social Network," In Web 2.0 Privacy and Security Workshop, IEEE Symposium on Security and Privacy, 2010.
  23. Chang, L.K. and S. Kwon, "A cognitive mapdriven avatar design recommendation DSS and its empirical validity," Decision Support Systems, Vol.45, No.3(2008), pp.461-472. https://doi.org/10.1016/j.dss.2007.06.008
  24. Chellappa, R.K. and R. Sin, "Personalization Versus Privacy:An Empirical Examination of the Online Consumer's Dilemma," Information Technology and Management, Vol.6, No.2(2005), pp.181-202. https://doi.org/10.1007/s10799-005-5879-y
  25. Cheung, C. and M.K.O. Lee, "Trust in internet shopping:a proposed model and measurement instrument," Proceedings of the 6th Americas Conference on Information Systems, (2000), pp.681-689.
  26. Chiu, C.M., M.H. Hsu, and E.T.G. Wang, "Understanding knowledge sharing in virtual communities:an integration of social capital and social cognitive theories," Decision Support Systems, Vol.42, No.3(2006), pp.1872-1888. https://doi.org/10.1016/j.dss.2006.04.001
  27. Cozby, P.C., "Self-disclosure:A literature review," Psychological Bulletin, Vol.79(1973), pp.73-91. https://doi.org/10.1037/h0033950
  28. Culnan, M.J., "How Did They Get My Name? An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use," MIS Quarterly, Vol.17, No.3(1993), pp.341-364. https://doi.org/10.2307/249775
  29. Davis, F.D., R.P. Bagozzi, and P.R. Warshaw, "User Acceptance of Computer Technology :A Comparison of Two Theoretical Models," Management Science, Vol.35, No.8(1989), pp. 982-1003. https://doi.org/10.1287/mnsc.35.8.982
  30. Dinev, T. and P. Hart, "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, Vol. 17, No.1(2006), pp.61-80. https://doi.org/10.1287/isre.1060.0080
  31. Dorminick, J.R., "Who Do You Think You Are? Personal Home Pages and Self-Presentation on the World Wide Web," Journalism and Mass Communication Quarterly, Vol.76, No.4(1999), pp.646-658. https://doi.org/10.1177/107769909907600403
  32. Donthu, N. and A. Garcia, "The Internet shopper," Journal of Advertising Research, Vol.39, No.3(1999), pp.52-68.
  33. Dowling, G.R., "The Effectiveness of Advertising Explicit Warranties," Journal of Public policy and Marketing, Vol.4(1985), pp.142-152.
  34. Dowlin, G.R. and R. Staelin, "A Model of Perceived Risk and Intended Risk-Handling Activity," Journal of Consumer Research, Vol.21, No.1(1994), pp.119-134. https://doi.org/10.1086/209386
  35. Eastlick, M.A., S.L. Lotz, and P. Warrington, "Understanding Online B-to-C Relationships :An Integrated Model of Privacy Concerns, Trust, and Commitment," Journal of Business Research, Vol.59(2006), pp.877-886. https://doi.org/10.1016/j.jbusres.2006.02.006
  36. Fishbein, M. and I. Ajzen, Belief, Attitude, Intention and Behavior:An Introduction to Theory and Research, Addison-Wesley, Reading, MA, 1975.
  37. Gefen, D., E. Karahanna, and D.W. Straub, "Trust and TAM in Online Shopping:An Integrated Model," MIS Quarterly, Vol.27, No.1(2003), pp.51-90. https://doi.org/10.2307/30036519
  38. Goffman, E., The Presentation of Self in Everyday Life, Doubleday, New York, 1959.
  39. Grazioli, S. and S.L. Jarvenpaa, "Perils of Internet Fraud:An Empirical Investigation of Deception and Trust with Experienced Internet Consumers," IEEE Transactions on Systems, Man, and Cybernetics, Part A:Systems Humans, Vol.30, No.4(2000), pp.395-410. https://doi.org/10.1109/3468.852434
  40. Harris, L., Associates, and A.F. Westin, Harris-Equifax Consumer Privacy Survey, Equifax, Inc., Atlanta, GA. 1991.
  41. Hollyman, F.M., The effect of personal control and instrumental value on the experience of invasion of privacy, Unpublished Doctoral Dissertation, Purdue University, 1977.
  42. Jansen, B.J., M. Zhang, K. Sobel, and A. Chowdury, "Twitter power:Tweets as electronic word of mouth," Journal of the American Society for Information Science and Technology, Vol.60, No.11(2009), pp.2169-2188. https://doi.org/10.1002/asi.21149
  43. Java, A., X. Song, T. Finin, and B. Tseng, Why we twitter:understanding microblogging usage and communities, Proceeding of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, (2007), pp.56-65.
  44. Java, A., X. Song, T. Finin, and B. Tseng, "Why we twitter:An analysis of a microblogging community," Advances in Web Mining and Web Usage Analysis, Vol.54, No.39 (2009), pp.118-138.
  45. Jarvenpaa, S.L., N. Tractinsky, and M. Vitale, "Consumer Trust in an Internet Store," Information Technology and Management, Vol.1, No.12(2000), pp.45-71. https://doi.org/10.1023/A:1019104520776
  46. Jourard, S.M. and P. Lasakow, "Some factors in self-disclosure," Journal of Abnormal and Psychology, Vol.10(1958), pp.91-98.
  47. Jourard, S.M., Self-disclosure:An experimental analysis of the transparent self, Wiley, New York, 1971.
  48. Kim, H.S. and D.K. Sherman, "Express Yourself: culture and the effect of self-expression on choice," Journal of personality and Social psychology, Vol.92, No.1(2007), pp.1-11. https://doi.org/10.1037/0022-3514.92.1.1
  49. Krishnamurthy, B. and C.E. Wills, "Characterizing privacy in online social networks," Proceedings of the first workshop on Online social networks, (2008), pp.37-42.
  50. Leary, M.R. and R.M. Kowalski, "Impression Management:A Literature Review and Two-Component Model," Psychological Bulletin, Vol.107, No.1(1990), pp.34-47. https://doi.org/10.1037/0033-2909.107.1.34
  51. Leary, M.R., Self-Presentation:Impression Management and Interpersonal Behavior, Westview Press, Boulder, 1995.
  52. Lee, H., G. Phillipa, and K. Balachander, "How much is too much? Privacy issues on Twitter," Conference of International Communication Association, Singapore, 2010.
  53. Liu, C., J.T. Marchewka, J. Lu, C.S. Yu, "Beyond concern-a privacy-trust-behavioral intention model of electronic commerce," Information and Management, Vol.42(2005), pp.289-304. https://doi.org/10.1016/j.im.2004.01.003
  54. Macneil, I.R., The new social contract:An inquiry into modern contractual relations, New Haven, CT:Yale University Press, 1980.
  55. Malhotra, N.K., S.S. Kim, and J. Agarwal, "Internet users' information Privacy Concerns (IUIPC):The Construct, The Scale, and a Causal Model," Information Systems Research, Vol.15, No.4(2004), pp.336-355. https://doi.org/10.1287/isre.1040.0032
  56. Metzger, M.J., "Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce," Journal of Computer-Mediated Communication, Vol.9, No.4(2004).
  57. McKenna, K.Y.A. and J.A. Bargh, "Coming out in the age of the Internet:identity demarginalization through virtual group participation," Journal of Personality and Social Psychology, Vol.75, No.68(1998), pp.1-94.
  58. McKnight, D.H., L.L. Cummings, N.L. Chervany, "Initial trust formation in new organizational relationships," Academy of Management Review, Vol.23, No.3(1998), pp.472-490.
  59. Milne, G.R. and M.-E. Boza, "Trust and Concern in Consumers' Perceptions of Marketing Information Management Practices," Journal of Interactive Marketing, Vol.13, No.1(1999), pp.5-24. https://doi.org/10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9
  60. Mitchell, V.W., F. Davies, L. Moutinho, and V. Vassos, "Using neural networks to understand service risk in the holiday product," Journal of Business Research, Vol.46 (1999), pp.167-80. https://doi.org/10.1016/S0148-2963(98)00020-4
  61. Nardi, B.A., D.J. Schiano, M. Gumbrecht, and L. Swartz, "Why we blog," Commun. ACM, Vol.47, No.12(2004), pp.41-46. https://doi.org/10.1145/1035134.1035163
  62. Park, S.-B. and N. Chung, "Mediating roles of self-presentation desire in online game community commitment and trust behavior of Massive Multiplayer Online Role-Playing Games," Computers in Human Behavior, Vol.27, No.6(2011), pp.2372-2379. https://doi.org/10.1016/j.chb.2011.07.016
  63. Pavlou, P.A., "Consumer Acceptance of Electronic Commerce:Integrating Trust and Risk with the Technology Acceptance Model," International Journal of Electronic Commerce, Vol.7, No.3(2003), pp.101-134.
  64. Pedersen, P.E. and H. Nysveen, "Usefulness and Self-Expressiveness:Extending TAM to Explain the Adoption of a Mobile Parking Service," 16th Bled eCommerce Conference e-Transformation, Bled, Slovenia, 2003.
  65. Posey, C., P.B Lowry, T.L. Roberts, and T.S. Ellis, "Proposing the online community self-disclosure model:the case of working professionals in France and the U.K. who use online communities," European Journal of Information Systems, Vol.19(2010), pp.181-195. https://doi.org/10.1057/ejis.2010.15
  66. Rice, R.E. and G. Love, "Electronic Emotion," Communication Research, Vol.14, No.1(1987), pp.85-108. https://doi.org/10.1177/009365087014001005
  67. Schoenbachler, D.D. and G.L. Gordon, "Trust and Customer Willingness to Provide Information in Database-Driven Relationship Marketing," Journal of Interactive Marketing, Vol.16, No.3(2002), pp.2-16. https://doi.org/10.1002/dir.10033
  68. Sheehan, K.B. and M.G. Hoy, "Dimensions of Privacy Concern Among Online Consumers," Journal of Public Policy and Marketing, Vol.19, No.1(2000), pp.62-73. https://doi.org/10.1509/jppm.19.1.62.16949
  69. Slyke, C.V., J.T. Shim, R. Johnson, and J. Jiang, "Concern for Information Privacy and Online Consumer Purchasing," Journal of the Association for Information Systems, Vol.7, No.6(2006), pp.415-444.
  70. Smith, H.J., S.J. Milberg, and S.J. Burke, "Information Privacy:Measuring Indiiduals' Concerns about Organizational Practices," MIS Quarterly, Vol.20, No.2(1996), pp.167- 196. https://doi.org/10.2307/249477
  71. Stern, S.R., "Virtually speaking:Girls' Self- Disclosure on the WWW," Women's Studies in Communication, Vol.25(2002), pp.223-253. https://doi.org/10.1080/07491409.2002.10162447
  72. Stewart, KJ., "Transference as a means of building trust in world wide web sites," Proceeding of the 20th International Conference on Information Systems, (1999), pp.459-464.
  73. Stewart, K.J. and H. Segars, "An empirical examination of the concern for information privacy instrument," Information Systems Research, Vol.13, No.1(2002), pp.36-49. https://doi.org/10.1287/isre.13.1.36.97
  74. Trumbo, C.W., "Heuristic-systematic information processing and risk judgment," Risk Analysis, Vol.19, No.3(1999), pp.391-400.
  75. Venkatesh, V. and F.D. Davis, "A Model of the Antecedents of Perceived Ease of Use: Development and Test," Decision Sciences, Vol.27, No3(1996), pp.451-481. https://doi.org/10.1111/j.1540-5915.1996.tb01822.x
  76. Venkatesh, V. and F.D. Davis, "A theoretical extension of the technology acceptance model: four longitudinal field studies," Management Science, Vol.46(2000), pp.186-204. https://doi.org/10.1287/mnsc.46.2.186.11926
  77. Wallace, P. The psychology of the internet, Cambridge Univ. Press, 1999.
  78. Walther, J.B. and J.K. Burgoon, "Relational Communication in Computer-Mediated Interaction," Human Communication Research, Vol.19, No.1(1992), pp.52-88. https://doi.org/10.1177/009365092019001003
  79. Westin, A., Privacy and Freedom, Atheneum, New York, 1967.
  80. Xu, H., H.H. Teo, and B.C.Y. Tan, "Predicting the Adoption of Location-Based Services: The Roles of Trust and Privacy Risk," in Proceedings of 26th International Conference on Information Systems, D. Avison, D.F. Galletta, and J.I. DeGross (eds.), Las Vegas, NV, (2005), pp.897-910.
  81. Yehoshua, L. and S. Shmuel, "Perceived risks as barriers to internet and e-commerce usage," Qualitative Market Research:An International Journal, Vol.5(2002), pp.291-300. https://doi.org/10.1108/13522750210443245