Investigating Privacy Perception and Behavior on Weibo

Investigating Privacy Perception and Behavior on Weibo

Clinton Amos (John B. Goddard School of Business and Economics, Weber State University, Ogden, UT, USA), Lixuan Zhang (John B. Goddard School of Business and Economics, Weber State University, Ogden, UT, USA) and Iryna Pentina (Department of Marketing and International Business, University of Toledo, Toledo, OH, USA)
Copyright: © 2014 |Pages: 14
DOI: 10.4018/joeuc.2014100103

Abstract

More than half of Chinese Internet users participate in Weibo, the most popular social media and microblogging platform in China. Weibo encourages members to voluntarily contribute personal information, leading to potential privacy invasion. This study examines how trust in other members and perceptions of government intrusion affect privacy-related attitude and behavior on this social platform. Analysis of survey responses from 221 Weibo users confirm that perceived government intrusion is strongly correlated with privacy concern and self-protective behavior. Trust towards other Weibo participants is not significantly related to privacy concern; however it has a significant negative relationship with self-protective behavior. The study also reveals that privacy concern is positively related to self-protective behavior. Findings and their implications for future research and practice are provided.
Article Preview

2. Theoretical Development And Hypotheses

Communication privacy management (CPM) theory (Petronio, 2002) suggests that individuals believe private information is a possession that they have the right to control. Consequently, each person forms an informational space around oneself, and its individually-established boundaries determine information sharing behavior. Depending on the situational and personal factors, any attempt by others to penetrate these boundaries can represent a threat. In social media, due to ubiquitous access to information by anyone, situational factor such as the government policy and personal factor such as trust in other members may affect individual information boundary. The resulting perceived concern may lead limited information disclosure or the provision of false information.

Complete Article List

Search this Journal:
Reset
Open Access Articles
Volume 32: 4 Issues (2020): 1 Released, 3 Forthcoming
Volume 31: 4 Issues (2019): 1 Released, 3 Forthcoming
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing