Factors Affecting Personal Information Sharing: Small-Scale Sample Analysis on Social Media
Abstract
In the contemporary social landscape, the widespread use of social media, such as platforms like TikTok, Instagram, and YouTube, has become a prominent trend in various circles of society, especially in Indonesia. As the number of users on these platforms increases, concerns regarding user security and privacy also increase. Data breaches in 2021 affecting 235 million users on Instagram, TikTok, and YouTube underscored the importance of researching the multifaceted dynamics around privacy concerns, levels of trust, risk awareness, and user behavior patterns related to sharing personal information on social media platforms. This research aimed to address this critical issue by introducing a research model developed based on relevant hypotheses from previous research. The sample used in this research consisted of social media users in Indonesia. Methodologically, this research used sophisticated structural equation modeling (SEM) tools for hypothesis testing and confirmatory factor analysis (CFA) to validate the efficacy of existing research models. These findings indicated that users’ trust, awareness, privacy concerns, and behavioral intentions significantly and positively influence the tendency to share personal data on social media platforms. This research provides valuable insights into the complex interactions between factors influencing user behavior in social media privacy, thereby offering implications for academia and practical applications.
References
Kepios “Digital 2023 Global overview report,” Singapore, Singapore, 2023. [Online]. Available: https://wearesocial.com/wp-content/uploads/2023/03/Digital-2023-Global-Overview-Report.pdf
S. Dhawan, K. Singh, and S. Goel, “Impact of privacy attitude, concern and awareness on use of online social networking,” in 2014 5th Int. Conf. - Conflu. Next Gener. Inf. Technol. Summit (Confluence), 2014, pp. 14–17, doi: 10.1109/CONFLUENCE.2014.6949226.
Asosiasi Penyelenggara Jasa Internet Indonesia, “Profil Internet Indonesia 2022,” Yogyakarta, D.I. Yogyakarta, 2022. [Online]. Available: apji.or.id
F.K. Bonang. “Indonesia, pengguna Instagram terbesar se-Asia Pasifik.” Kompas.com. Access date: 26-Mar-2023. [Online]. Available: https://tekno.kompas.com/read/2017/07/27/11480087/indonesia-pengguna-instagram-terbesar-se-asia-pasifik
S.E. Rumaropen. “Deddy Corbuzier geram karena fotonya dengan Sabrina bocor, ujung-ujungnya ada yang minta maaf.” Suryamalang.com. Access date: 21-Jun-2023. [Online]. Available: https://suryamalang.tribunnews.com/2018/07/01/deddy-corbuzier-geram-karena-fotonya-dengan-sabrina-bocor-ujung-ujungnya-ada-yang-minta-maaf?page=all
N. Venkatachalam and R. Anitha, “A multi-feature approach to detect Stegobot: A covert multimedia social network botnet,” Multimed. Tools Appl., vol. 76, no. 4, pp. 6079–6096, Feb. 2017, doi: 10.1007/s11042-016-3555-3.
S. Rathore et al., “Social network security: Issues, challenges, threats, and solutions,” Inf. Sci., vol. 421, pp. 43–69, Dec. 2017, doi: 10.1016/j.ins.2017.08.063.
G. Harden, “Knowledge sharing in the workplace: A social networking site assessment,” in 2012 45th Hawaii Int. Conf. Syst. Sci., 2012, pp. 3888–3897, doi: 10.1109/HICSS.2012.408.
M. Kügler, S. Smolnik, and P. Raeth, “Determining the factors influencing enterprise social software usage: Development of a measurement instrument for empirical assessment,” in 2013 46th Hawaii Int. Conf. Syst. Sci., 2013, pp. 3635–3644, doi: 10.1109/HICSS.2013.173.
Y. Jeong and Y. Kim, “Privacy concerns on social networking sites: Interplay among posting types, content, and audiences,” Comput. Human Behav., vol. 69, pp. 302–310, Apr. 2017, doi: 10.1016/j.chb.2016.12.042.
P. Raeth and S. Smolnik, “Antecedents and consequences of corporate weblog usage in the intranet: A process perspective,” in 2010 43rd Hawaii Int. Conf. Syst. Sci., 2010, pp. 1–10, doi: 10.1109/HICSS.2010.63.
V. Paramarta et al., “Impact of user awareness, trust, and privacy concerns on sharing personal information on social media: Facebook, Twitter, and Instagram,” in 2018 Int. Conf. Adv. Comput. Sci. Inf. Syst. (ICACSIS), 2018, pp. 271–276, doi: 10.1109/ICACSIS.2018.8618220.
N. Hajli and X. Lin, “Exploring the security of information sharing on social networking sites: The role of perceived control of information,” J. Bus. Ethics, vol. 133, no. 1, pp. 111–123, Jan. 2016, doi: 10.1007/s10551-014-2346-x.
J. Cendrawan and C.R.P. Ajisuksmo, “Faktor-faktor yang memengaruhi keinginan mahasiswa dalam menggunakan media sosial,” J. Ilmu Komun., vol. 17, no. 2, pp. 203–216, Dec. 2020, doi: 10.24002/jik.v17i2.1793.
D.B. Ginting, “Structural equation model (SEM),” Media Inform., vol. 8, no. 3, pp. 121–134, Nov. 2009.
I. Ghozali, Structural Equation Modeling Metode Alternatif dengan Partial Least Squares (PLS), 4th ed. Semarang, Indonesia: Universitas Diponegoro Press, 2014.
J.F. Hair, W.C. Black, B.J. Babin, and R.E. Anderson, Multivariate Data Analysis, 7th ed. London, United Kingdom: Pearson, 2014.
S.K. Laughlin Jr., “Westin: Privacy and Freedom,” Mich. Law Rev., vol. 66, no. 5, pp. 1064–1075, 1968.
I. Kayes, N. Kourtellis, F. Bonchi, and A. Iamnitchi, “Privacy concerns vs. user behavior in community question answering,” in ASONAM '15: Proc. 2015 IEEE/ACM Int. Conf. Adv. Soc. Netw. Anal. Min. 2015, 2015, pp. 681–688, doi: 10.1145/2808797.2809422.
P. Thaichon, A. Lobo, and A. Mitsis, “Achieving customer loyalty through service excellence in Internet industry,” Int. J. Qual. Serv. Sci., vol. 6, no. 4, pp. 274–289, Nov. 2014, doi: 10.1108/IJQSS-03-2014-0024.
A. Gupta and A. Dhami, “Measuring the impact of security, trust and privacy in information sharing: A study on social networking sites,” J. Direct Data Digit. Mark. Pract., vol. 17, no. 1, pp. 43–53, Sep. 2015, doi: 10.1057/dddmp.2015.32.
V. Venkatesh, M.G. Morris, G.B. Davis, and F.D. Davis, “User acceptance of information technology: Toward a unified view,” MIS Quart., vol. 27, no. 3, pp. 425–478, Sep. 2003, doi: 10.2307/30036540.
C. Abraham and P. Sheeran, “Implications of goal theories for the theories of reasoned action and planned behavior,” in Planned Behavior: The Relationship between Human Thought and Action, C.J. Armitage and J. Christian, Eds., New York, NY, USA: Routledge, 2004.
I. Ghozali, Aplikasi Analisis Multivariete Dengan Program IBM SPSS. Semarang, Indonesia: Universitas Diponegoro Press, 2016.
J. Wu and D. Padgett, “A direct comparative framework of customer satisfaction: An application to Internet search engines,” J. Interact. Mark., vol. 18, no. 2, pp. 32–50, May 2004, doi: 10.1002/dir.20004.
I. Ghozali, Aplikasi Analisis Multivariate dengan SPSS. Semarang, Indonesia: Badan Penerbit UNDIP, 2005.
Sugiyono, Metode Penelitian Kuantitatif, Kualitatif dan Kombinasi (Mixed Methods). Bandung, Indonesia: Alfabeta, 2014.
H. Latan, Structural Equation Modeling: Konsep dan Aplikasi Menggunakan Program LISREL 8.80. Bandung, Indonesia: Alfabeta, 2012.
A. Acquisti and R. Gross, “Imagined communities: Awareness, information sharing, and privacy on the Facebook” in Privacy Enhancing Technologies, PET 2006, G. Danezis and P. Golle, Eds., Heidelberg, Germany: Springer, 2006, pp. 36–58, doi: 10.1007/11957454_3.
C. Dwyer, S.R. Hiltz, and K. Passerini, “Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace,” in Am. Conf. Inf. Syst. (AMCIS), 2007, Paper 339.
Z.I. Saleh and A. Mashour, “Evaluating security awareness impact on perceived risk and trust: The case of social networks,” Int. J. IT Eng., vol. 4, no. 5, pp. 99–110, May 2016.
C. Liu, J.T. Marchewka, J. Lu, and C.S. Yu, “Beyond concern–A privacy-trust-behavioral intention model of electronic commerce,” Inf. Manag., vol. 42, no. 2, pp. 289–304, Jan. 2005, doi: 10.1016/j.im.2004.01.003.
© Jurnal Nasional Teknik Elektro dan Teknologi Informasi, under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License.