Next Article in Journal
Does Machine Learning Offer Added Value Vis-à-Vis Traditional Statistics? An Exploratory Study on Retirement Decisions Using Data from the Survey of Health, Ageing, and Retirement in Europe (SHARE)
Next Article in Special Issue
Formulation of Parsimonious Urban Flash Flood Predictive Model with Inferential Statistics
Previous Article in Journal / Special Issue
How Does Irrigation Affect Crop Growth? A Mathematical Modeling Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Models of Privacy and Disclosure on Social Networking Sites: A Systematic Literature Review

Faculty of Electrical Engineering and Computer Science, University of Maribor, Koroska 46, 2000 Maribor, Slovenia
*
Author to whom correspondence should be addressed.
Submission received: 29 November 2021 / Revised: 26 December 2021 / Accepted: 27 December 2021 / Published: 4 January 2022
(This article belongs to the Special Issue Mathematics and Its Applications in Science and Engineering)

Abstract

:
Social networking sites (SNSs) are used widely, raising new issues in terms of privacy and disclosure. Although users are often concerned about their privacy, they often publish information on social networking sites willingly. Due to the growing number of users of social networking sites, substantial research has been conducted in recent years. In this paper, we conducted a systematic review of papers that included structural equations models (SEM), or other statistical models with privacy and disclosure constructs. A total of 98 such papers were found and included in the analysis. In this paper, we evaluated the presentation of results of the models containing privacy and disclosure constructs. We carried out an analysis of which background theories are used in such studies and have also found that the studies have not been carried out worldwide. Extending the research to other countries could help with better user awareness of the privacy and self-disclosure of users on SNSs.

1. Introduction

Nowadays, people use multiple social networking sites (SNSs) and other digital technologies, which have presented an important communication form in recent years, and are also, therefore, of great interest for researchers. SNSs are networked communication platforms where users publish their profiles that include user-supplied content, content provided by other users and data provided by the system; platforms where users can connect with other users; and a platform where users interact with user-generated content on the SNSs [1]. Facebook has been the most popular social network since 2009, with 2.89 billion monthly active users, and it is estimated that, in 2022, SNSs will reach 3.96 billion users [2]. Facebook is just one example of SNSs; however, in most research, it is used as a platform that researchers take as an example while asking users different questions regarding their use of SNSs.
User-generated content raises privacy issues, and questions on what effect privacy issues have on the disclosure of users on SNSs. Privacy is a personal boundary regulation process that regulates private information, and, depending on the context and disclosure of the information is defined as the act of revealing personal information to others [3,4,5]. The number of social networking users is rising, and although users are often concerned about their privacy, they often publish information on social networking sites willingly, which is also called a privacy paradox [6].
In this paper, we have searched for publications with statistical models containing both privacy and disclosure constructs. Most of the statistical models were structural equations models (SEM). The purpose of SEM is to assess model fit and test the hypotheses of the research [7]. SEM models are used in different areas, including financial operations, vaccination prediction and similar [8,9].
The motivation to start this study was to present a systematic review and analysis of state-of-the-art research in the field of privacy and disclosure on SNSs. In recent years, several studies researching the topic have been published, and the aim of this paper is also to indicate the missing links in the topic, and to show successfully presented research on this topic. This review could help future researchers to establish new models based on the existing models, and also give an overview of where the current studies were carried out and what their main findings were. This paper also presents measurement parameters for the presentation of models, and this could help with a better presentation of the research in this topic.
The systematic review only includes papers or publications containing privacy and disclosure constructs in the statistical models used. We have excluded review type research, discussions and model proposals without confirmation of the models presented. Researchers building new models with privacy and disclosure constructs on SNSs or other technologies could get a better overview of the research that has already been conducted on this topic and the missing research in the field.
The contribution of this study is to present state-of-the-art research where statistical models were formed in regard to SNSs users, their views of privacy and disclosure. Further on, a list of measurement parameters of the papers will be presented, and could be used by researchers as a checklist on what they should report in papers with statistical models.
The rest of the paper is organized as follows. In Section 2, we have reviewed existing literature and presented the background of SNSs, privacy and disclosure. In Section 3, we have defined the methodology for the systematic review, research questions, data sources, evaluation process, study criteria, data collection and literature measurement parameters. In Section 4, we have presented a bibliometric overview of the 98 selected publications, and carried out the analysis of the publications and the parameters of the papers included in the presentation of the models. A discussion of the results and the conclusion is presented in Section 5. In Appendix A, there is a full bibliometric overview of the 98 selected papers, and in Appendix B there is a table with scores for the measurement parameters of the models presented in the papers.

2. Background

This section discusses the fundamentals of privacy and disclosure in SNSs and the fundamentals of structural equations modeling (SEM), to help understand the rest of this paper. There were some systematic literature reviews done on this topic, but none of them include privacy and disclosure constructs in models where SNSs users were used as respondents to a questionnaire. In one study, the privacy paradox was explained by a systematic literature review, and other studies have focused their reviews only on privacy or disclosure constructs separately [10,11,12,13,14,15].

2.1. Privacy and Disclosure on SNSs

Privacy and disclosure on SNSs have been a topic of interest in many previous studies. Privacy presents an option where a person chooses the information they share and with whom they share it by using privacy controls on the SNSs. This is also similar to offline conversations in communication privacy management theory [16,17]. Many studies use different privacy constructs in their models; in one study there have been significant effects of information collection, profile control and general privacy concerns on privacy concerns and willingness to share users’ profiles with Facebook apps [18]. In regard to privacy control, some studies show that users tend to close their profiles on Facebook if their friends also have their profiles closed [19]. The privacy paradox shows that users often have high privacy concerns, but do not put any effort into making their information private [15]. Privacy constructs are often also connected to risk, where a user evaluates the risk of posting their personal information on the SNSs [20,21]. Trust is also a construct often connected to privacy, and has an impact on the user’s disclosure [22].
There are different disclosure factors in research connected to SNSs; some of them only involve self-disclosure, others also involve general information disclosure or intention to disclose information on the SNSs. Privacy constructs often have an effect on different disclosure behaviors of users on SNSs. Studies often confirm the effect of privacy concerns on self-disclosure [23,24]. Regarding information disclosure on Facebook, parents’ educational influence and frequent use of SNS motivate users to be more concerned about their privacy and to disclose less information [25]. Other constructs that have some impact on the disclosure of information on SNSs are the time being spent on SNSs, the number of friends, perceived risks and benefits, the need for popularity and personality factors [26,27,28]. The effects of privacy concerns, trusting beliefs and information sensitivity on information disclosure were confirmed in a study on Facebook users [29]. Moreover, other studies found a significant effect of privacy constructs on self-disclosure behaviors [30,31,32]. Often, data mining techniques are also used for SNSs’ network analysis for discovering patterns in users, and these techniques also bring a better understanding of users’ behavior on SNSs [33,34].
In research, SEM or regression models are usually based on previous theories, and the theories most often referred to will be presented in the next section.

2.2. Theories on Which the Models for Privacy and Disclosure Are Based

SEM and regression models are usually built based on previously established theories. There are many theories that could be a baseline for creating new SEM or regression models. One of the most used theories is privacy calculus, where it is expected that the users’ anticipated benefits and risks have an effect on sharing information on social networking sites, meaning that the users will act accordingly to what they view as costs and benefits of their information disclosure [35,36,37].
Another highly used theory is communication privacy management (CPM) theory, which defines privacy as the process of opening and closing boundaries to others [17]. First, if a user shares information with others, they extend the co-ownership of that information to other persons with whom they are sharing the information. Next, in the CPM theory, the control of private information is given to an individual, and the individual decides on revealing or concealing that information. Furthermore, boundary turbulence, according to the CPM theory, can occur when information that should be kept private is shared with others without the permission of the owner. This theory aligns well with SNSs, where users can control with whom they share their information.
A technology acceptance model (TAM) is also often used with SNSs. In TAM, external variables have an effect on perceived usefulness and perceived ease of use, and the latter also has an effect on perceived usefulness. Next, perceived usefulness and perceived ease of use have an effect on the attitude toward using technologies, and the attitude has an effect on the behavioral intention to use technology. The latter also has an effect on actual systems use. Although the TAM theory does not predict any privacy constructs, they are often used in the first part as external variables affecting the rest of the constructs in the proposed model. A behavioral intention to use technology is highly connected to information disclosure on SNSs [38,39].
The theory of reasoned action (TRA) proposes the effect of attitude and subjective norm on behavioral intention, and the effect of behavioral intention on actual behavior [40]. This theory separates the belief of what a person believes others would say if they share some information and the motivation of a person to share information. The theory of planned behavior (TPB) is a theory developed a bit later by one of the authors of TRA [41]. TPB uses the same model as in TRA, adding a new construct, perceived behavioral control, which has an effect on behavioral intention and behavior. The new construct presents the opportunities for performing a given behavior, where the individual with more opportunities acts so that their behavioral intention and behavior on the used technology is higher.
The above are the most commonly used theories in newly created models connected to privacy, disclosure and SNSs. There are also other theories, which could be used for creating models, but are not used so often.

2.3. Presentation of Model Results

It is crucial that scientific papers present clear results, so that they can be repeated by other researchers. When building new models and testing the relationships between proposed constructs, it is important that the background of the study is explained very clearly. That is why we looked to see if the papers have information on the constructs used in the model—this is also referred to as content validity. Next, it is important that we do a pre-test of the study on a smaller sample to test the validity of the results. Most often the models involving constructs use quantitative measures, and it is important that the reader of such a paper is informed on what kind of scale they used. Often, they use a 5-point or 7-point Likert scale to get the results for each item in the construct. Normally, people collaborating in the survey see a statement, and they have to evaluate it on a 5- or 7-point scale, for example, 1 meaning “I do not agree” and 5 meaning “I fully agree”.
It is also important to know when and where the study to test the model was carried out, so in the presentation of model results, a year and preferably also the month and days of the survey should be presented, as well as the country where the survey was distributed. Next, the authors of papers with models should present their sample frame, which should include information on who was invited to participate in their study. Next, we looked for an explanation if they used random sampling or any other method for sampling. If possible, the response rate should be over 20%, where it is possible to measure this (depending on the sampling method).
In the presentation of the model’s results, we were also looking for the number of participants in the survey, to evaluate if the results could be generated to a broader population. Next, it is also important to know from what age range the participants have collaborated in the survey. If, for example, the survey was sent to college students, it can possibly be generalized to a college population, but not to the whole population. Lastly, it is important that the researchers present the gender ratio of participants collaborating in the survey, again to see if this can be generalized to the general public. In the next section, we will present some measures important for presenting the results of structural equations modeling.

2.4. Structural Equations Modeling (SEM)

Quantitative studies can be analyzed in several ways. There are different ways of testing the hypothesis, but the mostly used method for building models for behavior in SNSs is structural equations modeling. There are a few steps that need to be carried out beforehand to prepare the data and analyze it [42]. To understand the steps better, we will present some basic descriptions of measures that should be published in papers presenting their models.
The authors of papers containing SEM should present what items they used to test each construct. Normally, each construct should have more items for testing the whole model. Next, it is important that the convergent validity of items is presented by measuring Cronbach’s alpha, composite reliability and average variance extracted measures. Cronbach’s alpha is a measure that tests to what extent multiple items for a construct belong together. Cronbach’s alpha coefficient ranges from 0 to 1, and the acceptable reliability coefficient is above 0.7; in some research, authors also discuss that a coefficient above 0.6 is sufficient [43,44]. Cronbach’s alpha is calculated for each construct in the model. Composite reliability is a measure of the internal consistency required in internally correlated latent variables, and its measure should be greater than 0.7 [45]. The average variance extracted measures the amount of variance captured by a construct in relation to the amount of variance due to measurement error, and it should be greater than 0.5 [46,47].
In the next step, authors of papers should present construct validity with exploratory factor analysis, carried out with factor loadings, where some items could be excluded before continuing to confirmatory factor analysis [48].
Next, confirmatory methods for the proposed model should be presented in papers with model fit to validate the proposed model. Most often presented are the chi-square statistic (Cmin/df), the normed fit index (NFI), the goodness-of-fit (GFI), the comparative fit index (CFI) and the root mean square error of approximation (RMSEA). The recommended values for these model fits are below 0.3 for chi-square, above 0.9 for NFI, GFI and CFI, and below 0.1 for RMSEA [46,49,50].
In regression or SEM models, the path coefficient analysis and the results of the t-statistic are very important to understand the paths between different constructs. The strength and significance of each path are normally evaluated by the standardized coefficient (β), and by a t value higher than 2.0 or lower than −2.0 [51]. It is important that the authors present these results in the paper, and it is also important how they form the results. If the results are presented as a picture, a reader can see some of the path coefficient results from it right away. If they are presented in a table, the results are readable, but it takes more time to consolidate the results. Some authors also use explanations of path coefficients in text without any supporting materials such as pictures or tables. It is usually quite time consuming to find the results needed from such a form of presentation.
Next to path analysis, the coefficient of determination or variance explained (R2) for the dependent variable also presents the degree to which the percentage of variance in the dependent variable is accounted for by the independent variables that have an effect on it [42]. The higher this percentage is, the more variance is explained in the specific dependent variable, and the fewer outer independent variables could have an effect on it.
At the end of each paper, it is important that internal validity is discussed—the model results should be compared to existing literature and explained.

3. Methodology

First, we defined the methodology to be used. The objective of our study was to carry out a systematic review of all existing models used on social networking sites with users regarding their views of privacy and disclosure.

3.1. Research Questions

In this study, we intend to answer the following research questions:
  • RQ1: To what extent is privacy and disclosure behavior researched in social networking sites?
  • RQ2: Which are the most commonly used background theories for the models containing privacy and disclosure constructs?
  • RQ3: Do the SEM or regression models on privacy and disclosure include recommended measures for explaining the results of the model?

3.2. Data Sources

The systematic review included the following 6 electronic databases:
  • Clarivate Analytics—Web of Science (WoS),
  • Elsevier ScienceDirect (SD),
  • Springer SpringerLink (Springer),
  • Google Scholar,
  • IEEE Xplore (IEEE),
  • ACM Digital Library (ACM).
The review was conducted by three reviewers, and the search in all databases returned 35,588 results. Due to a lack of advanced search options in Google Scholar and SpringerLink, some results were not related to our search. Therefore, we have only included the 500 most relevant papers from Google Scholar and the 400 most relevant from SpringerLink in our research.
The query strings defined below have been used to search for relevant publications.
The search strings were created by using the research domain and the research questions as a guide.
We used the following search terms:
((“SNS” OR “SNSs” OR “OSN” OR “OSNs” OR “online social networking” OR “online social networks” OR “social networking sites” OR “social networking site” OR “Facebook”) AND
(privacy) AND
(“disclosure” OR “self-disclosure” OR “Willingness to provide information” OR “information sharing”) AND
(“model” OR “path” OR “SEM” OR “coefficient” OR “coefficients” OR “impact” OR “PLS”))
The search in the online digital libraries was conducted in August 2021. The search query was made as broad as possible, to consider as many results as possible related to the research questions posed in this systematic review. The procedure used for searching and the selection of publications are summarized in Figure 1. The summary of the results returned for each database search is presented in Table 1.

3.2.1. Selection of Studies

The selection process started with 1388 publications gathered from online digital libraries. The publications were then included in the systematic review if they fulfilled the selection criteria. The selection process was then divided into four stages:
  • Stage 1: The search results were filtered according to the inclusion and exclusion criteria. We limited our systematic review to models, done on social networking sites’ users regarding their views of privacy and disclosure. We included studies from 2006 to 2022. The reason for choosing the year 2006 as the beginning of the range is the introduction of modern social networking sites to the general public, such as Facebook in 2006 [52]. The process was reviewed by three researchers.
  • Stage 2: We read paper titles and abstracts, and included in the further screening only papers with SEM or regression models done on social networking sites that included privacy and disclosure factors. In cases where relevancy could not be determined from the title and abstract, we studied the entire paper to make sure that all relevant papers were included. We excluded 1251 results.
  • Stage 3: We removed the duplicates from 6 different databases. There were 137 publications found, and after removing the duplicates, 113 publications were left for the next phase.
  • Stage 4: A thorough reading was used to analyze the remaining results in detail. The analyzed papers had to be related closely to the research topic and questions. The remaining results also had to include social networking sites, SEM models or regression models and privacy and disclosure factors. Some results were excluded, as the models did not include social networking site analysis, or included only one of the factors needed. Altogether, 15 results were excluded.
A total of 98 publications were included in the systematic review. The selection procedure was thorough, in order to ensure that only studies were examined that were relevant and of high quality. The CASP Systematic Review Checklist [53], which addresses the assessment of research in systematic reviews, was used to manage the process of acquiring, selecting, and reviewing data for the review.

3.3. Evaluation Process

In the evaluation process, we had several stages for including the papers into the final selection:
  • Range: We extracted the relevant papers through a comprehensive search in databases and evaluated the studies based on publication date (between 2006 and 2022) and originality (we included only original research).
  • Relevance: The title and abstract were scanned for relevance to the defined objective of including a model with privacy and disclosure constructs and SNSs users.
  • Inclusion: Studies were assessed based on the stage 1 (see Section 3.2.1) rules of selection of studies.
  • Thorough examination: We conducted a full reading of the papers to see if the studies fit the defined objective, and excluded the papers that did not fit the objective.
  • Data: Studies from the selection were analyzed, and we extracted data related to the objective and research questions from each paper.
  • Quality assessment: Studies were assessed thoroughly using the 23 criteria.

3.4. Study Criteria

We set the inclusion and exclusion criteria to form the final selection of the papers. In the inclusion criteria, the following points were checked:
  • Original research study.
  • Publication on the topic of social networking sites, privacy and disclosure.
  • The publication includes a sufficient explanation of the research findings.
  • Publication years range between 2006 and 2022.
We set the inclusion and exclusion criteria to form the final selection of the papers. For the exclusion criteria, the papers with the following characteristics were excluded:
5.
Secondary research, review papers and other non-relevant publications.
6.
Publications presenting ideas and no results (e.g., research designs).
7.
Publications presenting only privacy or only disclosure on models based on users of social networking sites.
8.
Publications in any other language but English.

3.5. Data Collection

After the final 98 papers were selected, we extracted data from those papers. First, we extracted the title, authors, year of publication, publication type, publisher and number of citations on Google Scholar. After collecting this information, each paper was analyzed thoroughly, and we extracted data connected to SEM models and regression models from it.
First, we collected the information on which theory the model in the papers was based. Then, we collected data if the factors in the model were discussed. Next, we looked for information if the authors of the papers wrote that they had conducted a pre-test of the questionnaire, and in what form the questionnaire was distributed. We also checked if the authors explained the scale used for validation, and if they have published the year of research. Later, we examined the papers for specification of the sample frame, meaning if the researchers explained who was invited to participate in their survey. We also looked for information on which SNSs platform the questions were referring to, and what kind of sampling the authors used (e.g., convenience, random). Next, we also looked for information whether the response rate was over 20%. Following this, we collected the information on the country of research, the number of participants in the study, the age span of participants and their gender ratio.
Next, we collected data on the model that was presented in the paper. First, we collected the information on the type of model (SEM, PLS-SEM, regression, …), if the authors used multi-items for testing the model, the number of constructs and number of items in the SEM model. We also collected information if the authors of the selected papers had presented convergent validity by presenting the Cronbach’s alpha results, composite reliability and average variance extracted results. Further on, we searched in all papers if construct validity and the results of confirmatory methods were presented. In the latter, we extracted the results of the χ2, NFI, GFI, CFI and RMSEA tests. Next, we collected the information on what kind of form the results of the model were presented in, and if there was internal validity or a discussion at the end of the paper. We also collected coefficient of determination (R2) results for privacy and disclosure factors, and all the path coefficients for predictor or consequence factors of privacy or disclosure factor.

3.6. Literature Quality

We assessed the literature quality by observing the measurement parameters based on the criteria defined in Table 2. The parameters for measuring quality were based on the review of the papers involving SEM models, and some papers on how to report the results of SEM and regression models [54,55]. We collected the data from each paper, and assigned the number of points each paper got considering the full paper content. The criteria were designed to measure the quality of each paper by examining if the paper presented all the measures needed for SEM or regression models. All 98 publications were assessed by three reviewers.
Each parameter was presented to the reviewer, who assessed the number of points the paper should get in each line. The reviewers could answer the questions with a number of points. All the parameters were objective and not subject to individual judgment, but the three reviewers were used for double-checking the number of points. A higher score presents a better fulfilment of the criteria.
The reviewers also checked if the year of conducting the survey for the research (5) was written, and the sample frame (6), meaning who was invited to participate in the survey, was explained. The reviewers also checked if the authors of the selected papers stated that they used random sampling (7). The reviewers also looked for the information if the response rate of the invited participants and responding participants was over 20% (8), or the country where the research was conducted (9). For each of the parameters from 1–9 the paper could receive 0 points for not fulfilling the requirement and 1 point for fulfilling it.
Next, the reviewers wrote down the number of participants (10) in the survey from the paper presenting the sample size (the number of participants responded to the survey). If the number of participants was not stated, the paper received 0 points for that parameter. Next, if the demographical data like the age of participants (11) and gender ratio of participants (12) were written in the paper, the paper received 1 point for these two parameters.
The next parameters were oriented towards models’ presentation. If the model was built with multi-item variables (13), the paper received 1 point. The average number of items per variable (14) was also collected. Next, the reviewers collected data if convergent validity was presented with three measures—Cronbach’s alpha (15), composite reliability (16) and average variance extracted (17). For each of the three measures, the paper received 1 point if the authors presented the results of the measures in the paper. Also, if construct validity (18) was elaborated by exploratory factor analysis with factor loadings, the paper received 1 point. Next, the reviewers searched for information on confirmatory methods (19) in the paper. If some confirmatory methods existed, the paper received 1 point, and if methods χ2, NFI, GFI, CFI, RMSEA (20) were presented, 0.20 point was given for each of these five methods. Next, if the results of the models (21) were presented in the text, the paper received 0.30 points, if they were presented in a table, the paper received 0.50 points, and if the results were presented in a picture, the paper received 1 point. It is a lot easier for a reader to see a picture with the results presented than to search for the correlation results in a table or text in a long paper. Finally, the paper received 1 point if internal validity (22) was present, meaning that the results were discussed thoroughly, and another point if the coefficient of determination (R2) results (23) were presented. The analysis of these parameters are presented in Section 4.3.

4. Analysis

4.1. Bibliometric Overview

In this section, a bibliometric overview of the selected publications is presented in Figure 2. The publications from the early years of research on this topic had a higher number of citations than the ones from the last years. The reason for low citation numbers in the last years is that there was not enough time for gathering citations, but we can assume those papers will receive additional citations. Among the 98 final papers, 84 were journal papers, 13 were conference papers, and one was a book section. If we observe the publication type through the years, we can see that, in the first years, there were more conference papers or an equal amount of conference papers to journal papers. This shifted drastically from 2012, where we can see that most of the papers with the topic on social networking sites, privacy and disclosure were published in journals. In 2021, only the first part of the year is included, and that is why the number of papers on the topic is lower, but we can already see some decline in 2020 in the total number of papers, which could also be due to the SARS-CoV-2 pandemic. The research field of social networking sites remains relevant.
As presented in Table 3, in the scope of the review we found papers from 65 different publishers. Some journals or conferences published more than one paper with models on privacy and disclosure. The journal Computers in Human Behavior published 11 papers, and the Journal of the Association for Information Science and Technology published five papers on this topic. The conference where most papers with models were published was The Americas Conference on Information Systems.

4.2. Analysis of Gathered Data

Basic information on the publications is presented in Table A1. The publication ID will be used on graphs and in the tables. Presented also are the authors, the title of the paper, the year of publication and publication type as well as publisher. Out of all the papers, 84 were published in journals, 13 in conferences and one in the book section. The first paper was published in 2007.
We conducted an analysis on which theories the models in the papers were based on. As presented in Table 4, most publications used the privacy calculus theory [37] and communication privacy management (CPM) [17] theory as the basic theory behind their model. Out of 98 papers, in 40 papers, the authors did not present any broader theory as a basis for their model. In 53 papers the authors used one theory, and in five papers the authors used two different theories.
The frequency of theories used in papers by publication year is shown in Figure 3. In recent years, there has been a growth of privacy calculus and CPM theories’ use. The theory acceptance model (TAM) theory [38] was used in most cases until 2015.
The world map in Figure 4 presents the number of studies carried out in which country. In some studies, more than one country was selected to confirm the models, so all the countries are counted leading to a total of 99 studies in 25 different countries. By continents, there were 38 studies carried out in North America, 36 in Asia, 24 in Europe and one in Africa.
After collecting the data from 98 papers, we also collected information on the coefficient of determination (R2) for privacy factors in each study (if available), and the R2 for disclosure factor in each study. R2 presents the percentage of the variation in the dependent variable that is predictable from the independent variables [56]. We collected the R2 for the privacy factor from 26 studies, and for the disclosure factor from 55 studies. As presented in Figure 5, we created a scatter plot of R2 and the number of participants in those studies.

4.3. Analysis of the Acquired Publications

The last part of the systematic review presents the scores for measuring the number of included parameters in the selected publications in regard to a good presentation of the paper. The used methodology for scores is presented in the Literature Section on quality. In Table A2 the score of the models in the papers is presented, based on the 23 measurement parameters from Table 2.
In Table 5, minimum and maximum values, as well as means and standard deviations are presented for each of the parameters. Since most of the parameters have 0 or 1 values, the mean also presents the percentage in how many papers the measurement parameters of the paper were met. Background theory was presented in 58 papers, while content validity was not presented in just one paper. A pre-test was included in 39 papers, and an explanation of the scale used for the measurements was found in 87 papers. The year of research was presented in 42 papers, and information on who was invited to participate in the survey in all papers. Random sampling was used only in eight papers, and a response rate of over 20% was reported in nine papers. In 85 papers, the country of research was given. The average number of participants in a survey was 522 respondents, and the age of participants was reported in 86 papers. The gender ration was reported in 88 papers.
Multi-item variables were used in 93 papers, and the average amount of items used for models was 4.04. Convergent validity was reported with Cronbach’s alpha, and composite reliability and average variance extracted in 77, 63 and 69 papers, respectively. Construct validity was reported in 70 papers, and confirmatory methods were used in 44 papers. Internal validity was discussed in 97 papers and coefficient of determination results were presented in 54 papers.
Next, we performed an ordered probit model with convergent validity (15–17) as a dependent variable, and theory presented (01), construct validity (18) and coefficient of determination (23) as independent variables. Cronbach’s alpha, composite reliability and average variance extracted were summed into one dependent variable, convergent validity, having 0, 1, 2 or 3 as a result for this variable for each paper. The results of the omnibus test were significant with the likelihood ratio chi-square 46.15, which means that our proposed model containing the three predictors represents a significant improvement compared to the unconditional model. The relationship between independent variables and the dependent variable were positive, with the p-values lower than 0.05, as presented in Table 6. We can assume that these relationships are statistically significant, and that there is a statistically significant positive linear relationship between theory presented, coefficient of determination, construct validity and convergent validity. Papers that have included theory presented, coefficient of determination and construct validity have a positive effect on convergent validity, meaning that they have also likely presented convergent validity measures if they have also presented the three parameters. All three parameters are statistically significant and were tested with the Wald chi-square test.
We also calculated the sum of scores for each publication by summing all points for the 23 parameters, but we divided the number of participants by 1000 and the average number of items available by 30, so that each of the parameters had similar minimum and maximum values. We also transformed the final scores to percentages for an easier graph reading. This score cannot be interpreted as a measure of quality, but it presents a number of items that were included in papers from the 23 parameters presented in Table 2. Moreover, if the authors exclude one parameter from reporting, it does not mean that it has the same scientific value as the other parameter they are reporting. The parameters are not presented in a balanced scale, but can serve as a checklist of which parameters were included in the reporting. Ideally, all the presented parameters should be included in studies explaining SEM models.
We used the sum of scores per year and per used theory in the papers, and created a graph in Figure 6. The clustered column presents the average score for all the papers that built the model based on a specific theory. In 40 papers, the authors did not use any theory as a background for building a model, and these papers had an average score of 52.95%, which was the lowest average score when comparing it to groups of papers with some background theories. In five papers, the authors used two theories as a background, and those papers were counted in each theory category. The highest sum of scores was received by the paper using the Social penetration theory (SPT). Further on, the average sum of scores per year of publication for each theory used in the papers is presented on the graph.
As is presented in Figure 7, the graph shows the average scores per publication year and per measurement parameter. All measures have a minimum and maximum value of 0 and 1, except measures 10 and 14. Measure 10 has a minimum of 0.07 and maximum of 3.09, and the highest average of 0.96 in 2018. Measure 14 has a minimum of 0.60 and maximum of 2.40, and the highest average of 1.31. In Figure 7 the orange column presents the average amount of points received in each parameter, and the blue dots present the average amount of points per years of publication. The darker dots present more recent studies, and are more often seen above the average of the specific parameter than the lighter dots. A further detailed analysis of each parameter shows that some measures have been used more often in recent years than they were in the first years. This increase of reporting specific parameters in papers can be seen in: (1) theory presented, (16) composite reliability, (17) average variance extracted, (18) construct validity and (19, 20) confirmatory methods, Moreover, the value for parameter (10), which presents the number of participants who responded to the survey, was increasing until 2018, from 117 to 962 participants on average per year, but after that year, the number of participants decreased to 350, 462 and 356 in the years 2019, 2020 and 2021 respectively. The results show that the authors in the recent publications have improved the quality of reporting SEM or other statistical models on the topic of privacy and disclosure on SNSs.

5. Discussion and Conclusion

In this section, we discuss the proposed research questions based on the presented analysis of the papers.
RQ1: To what extent is privacy and disclosure behaviour researched in social networking sites?
The most popular social networking site, Facebook, was founded in 2006, and has been the most popular SNS since 2009. Researchers had already started carrying out research with building models with privacy and disclosure of users in 2007, so the topic has been extensively researched for the past 14 years. In the review process, we included 98 papers containing such papers with models, found in 6 electronic databases. The number of citations these papers received are very high; papers with more than 500 citations up to now have been received by the papers published in 2007, 2010, 2012 and 2014 [57,58,59,60]. This shows that the topic is still interesting to other researchers.
The number of citations for all publications per year, summed for all papers in a year and the number of papers per publication type per year are presented in Figure 2. In the first years more conference papers were published, but, later on, journal papers prevailed.
Further on, in Table 3, we found that 65 different publishers have published papers containing models with privacy and disclosure. Among most published papers are the Computers in Human Behavior journal, which published 11 papers, and the Journal of the Association for Information Science and Technology, which published five papers on this topic.
In Figure 4, we also presented a world map, where the number of studies in each country is presented. Some studies did not have that information, and some studies were conducted in more than two countries. Altogether, the studies were carried out in 25 different countries. If we consider the continents, most studies (38) were conducted in North America, followed by 36 in Asia, 24 in Europe and one in Africa.
All our findings show that this is an active field, and none of the studies included all factors that could have an effect on privacy or disclosure factors when considering SNSs because the highest coefficient of determination presented in Figure 5 is 65% for privacy factor and 87% for disclosure factor.
RQ2: Which are the most commonly used background theories for the models containing privacy and disclosure constructs?
In this paper, we also collected information on the background theories used in the models, containing privacy and disclosure constructs, built with SNSs users. Normally, when building a model for SNSs, established theories are used as a background for newly created models. We collected information on which background theories were used in specific papers. In 40 out of 98 papers, the authors did not present any background theory. In 52 papers, the authors used one background theory, and in five papers, the authors used two different theories.
Altogether, the privacy calculus theory has been used in 20 papers, and the communication privacy management theory has been used in 18 papers. There has been a growth of these two theories’ usage in the papers in recent years. The technology acceptance model (TAM) has been used in seven studies, the theory of reasoned action (TRA) in five studies, the theory of planned behavior (TPB) in three studies, and social capital theory (SCT) in two studies, but all these four theories were used mostly in the beginning of the research, mainly until 2015. Since 2016, new theories have been used in the papers, such as the protection motivation theory (PMT), the construal level theory (CLT), the unified theory of acceptance and use of technology (UTAUT2), concern about others’ privacy (COP), disclosure of information about others (DIO), the social penetration theory (SPT) and the social role theory (SRT).
The analysis of the used background theories are presented in Table 4, where the number of papers the theory was used in is presented, and in Figure 3, where frequency of theories used in papers is presented by year of publication.
RQ3: Do the SEM or regression models on privacy and disclosure include recommended measures for explaining the results of the model?
In the research papers it is very important that the quality of the presented results is high. When presenting SEM or regression models, it is important to include substantial information on how the data were gathered and how the measurement items were established. Further, it is important that the analysis of results is presented in the most detailed way possible for the possibility of replication and better understanding by the reader of the analysis results. Based on the presentation of the results, the papers were given a score for the 23 measurement parameters, which we searched for in each paper. The 23 measurement parameters are presented in Table 2, their analysis in Table 5, and the individual scores given to each of the 98 papers are presented in Table A2.
The parameters with the three lowest average number of points are presented, meaning that these parameters were not presented in the papers often, and further research papers could focus on also including these parameters. First, random sampling was not mentioned in 90 out of 98 papers, which is often hard to achieve. Most commonly the convenience sampling method was used, and this method does not require random sampling. Second, the response rate was not mentioned in 89 papers, which is, again, expected if most papers are using the convenience sampling method where response rate is often difficult to track. Third, in confirmatory methods, information on the results of the χ2, NFI, GFI, CFI and RMSEA methods were collected, and 54 papers did not present any of the confirmatory methods for their models. The confirmatory methods are used for presenting model fit to validate the proposed model, and it is vital for readers to understand how the proposed model fits within the well-established methods for testing SEM models.
The results also show that papers with some background theory had a better quality of reporting the models, and that, in recent years, the amount of measurement parameters included in reporting has also improved in papers presenting privacy and disclosure in SNSs.
In sum, the research in building models with privacy and disclosure constructs in connection to SNSs is quite broad, but it is still an active field for researchers, because the SNSs are evolving. Also, the theories used as background theories are changing through time, and, most importantly, researchers need to understand that the quality of the results’ presentation for statistical models is very important if they want to achieve acknowledgement.

5.1. Conclusions

This research presents a current overview of state-of-the art papers, where models have been built containing privacy and disclosure constructs in regard to SNSs’ use. Many users visit Facebook and other SNSs on a daily basis. SNSs users share a great deal of personal information daily, hence the reason for privacy and disclosure being highly researched from the beginning of the use ofSNSs.
In this paper, we collected 98 papers in six online databases published between 2006 and 2022. The papers contain privacy and disclosure constructs, and were tested on SNSs’ users. We defined three research questions and analyzed 98 papers according to the research questions. The selected papers are highly cited, and most studies were conducted in North America, Asia and Europe, in 25 different countries.
Our findings also indicate that papers which used background theories for their models also presented their analysis better in the paper, scoring a higher percentage for the sum of scores. In 40 out of 98 papers, the authors did not present any background theory. Next, it is crucial that the researchers present their SEM or regression models with detailed background information and analysis results, for the reader to understand the results better. The parameters that received the lowest score on average for all papers were random sampling, response rate and confirmatory methods. It is difficult to achieve random sampling because most researchers work on a budget, and that is why, usually, response rate is also not calculated, because most papers use convenience sampling methods. However, it is very important that the researchers confirm their built SEM models with confirmatory methods, which did not happen in 54 papers.
The limitation of this paper is that the sum of scores for parameters presents a weighted scale, and because most of the analyzed models were SEM, the scores were established from multiple sources to obtain broader information of the paper presentation and results. The sum of scores for papers was used in two figures and it presents a one-dimensional quality ranking of papers. However, we find that the results in the two figures present a good outline for future papers on this topic.
The limitation of this study is also that papers appearing in database searches up to August 2021 are included in the analysis, while more papers could have been published by the time the paper was published. These papers could be added for further research on this topic to extend the list of 98 extracted papers.
There is greater potential for publishing quality research work regarding privacy and disclosure models. Most of the built models also present a foundation for SNSs developers to understand the users’ view of privacy, and, afterwards, users’ disclosure of information. The field is still very active and important for researchers to continue their research work on SNSs to get a better understanding of SNSs information development.
Some systematic review studies have already included SEM or regression models for SNSs users, but, to the best of our knowledge, none of the studies included such a sample of models focusing on privacy and disclosure constructs [15]. Some existing literature reviews focus only on privacy constructs or disclosure, or behavior constructs separately [10,11,12,13,14]. No other paper has analyzed SEM and regression models with such methods.

5.2. Future Research Directions

This paper gives future researchers on this topic an overview of state-of-the-art papers containing models with privacy and disclosure constructs tested on SNSs users. In the paper, theories used in such studies as a background are presented, and may be useful for future researchers. Additionally, also presented are journals or conferences that have accepted the most papers, which is useful for authors looking for journals or conferences where they could publish their work.
There is some lack of worldwide research on this topic, because most of the studies were carried out in North America, Asia and Europe, but SNSs are used by most of the population of the world. This is a possibility of constructing the same research in parts of the world where such studies have not yet been conducted and can bring new findings in this topic. It is also important that researchers in the future studies with SEM and other statistical models present their results in detail, so that the paper reaches more readers and acknowledgements. The topic selected for this systematic review is still very active, and new research should be conducted because SNSs are also changing constantly, as well as users’ opinions.
For future research, there are many studies that could be carried out to extend the current knowledge on the topic. Our research shows that privacy constructs often have an effect on disclosure constructs in SEM done on SNSs users. The highest coefficients of determination for privacy and disclosure constructs were 65% and 87%, respectively. This shows that there is opportunity for future research on finding new constructs that affect privacy or disclosure.
One systematic literature review on privacy attitude and behavior was carried out in 2017 [15]. The area of systematic literature reviews on privacy, disclosure and SNSs also lacks a thorough review of what factors have an effect on privacy and disclosure constructs, and which privacy and which disclosure constructs are used in existing models. This could give researchers a better idea of what is still not researched in the field of privacy and disclosure on SNSs.

Author Contributions

Conceptualization, L.N.Z.; methodology, L.N.Z., L.H. and M.H.; validation, L.N.Z.; formal analysis, L.N.Z., L.H. and M.H.; data curation, L.N.Z. and M.H.; supervision, T.W.; writing—original draft preparation, L.N.Z.; writing—review and editing, L.N.Z. and M.H.; visualization, L.N.Z.; funding acquisition, T.W. All authors have read and agreed to the published version of the manuscript.

Funding

The authors acknowledge the financial support from the European Union’s Horizon 2020 Research and Innovation Program under the CONCORDIA project (GA No. 830927) and the Slovenian Research Agency (Research Core Funding No. P2-0057 and bilateral project BI-US/19-21-017).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

The authors acknowledge the financial support from the European Union’s Horizon 2020 Research and Innovation Program under the CONCORDIA project (GA No. 830927) and the Slovenian Research Agency (Research Core Funding No. P2-0057 and bilateral project BI-US/19-21-017).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Bibliometric overview of selected papers.
Table A1. Bibliometric overview of selected papers.
Publication IDReferenceYearAuthorsTitlePublication TypePublisher
1[57]2007Dwyer, C., et al.Trust and privacy concern within social networking sites: A comparison of Facebook and MySpaceConferenceAMCIS
2[61]2010Lo, J.Privacy Concern, Locus of Control, and Salience in a Trust-Risk Model of Information Disclosure on Social Networking SitesConferenceAMCIS
3[62]2010Lo, J. and C. K. RiemenschneiderAn Examination of Privacy Concerns and Trust Entities in Determining Willingness to Disclose Personal Information on a Social Networking SiteConferenceAMCIS
4[58]2010Krasnova, H., et al.Online social networks: Why we discloseJournalJournal of Information Technology
5[63]2010Posey, C., et al.Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communitiesJournalEuropean Journal of Information Systems
6[64]2011Gibbs, J. L., et al.First Comes Love, Then Comes Google: An Investigation of Uncertainty Reduction Strategies and Self-Disclosure in Online DatingJournalCommunication Research
7[65]2011Almadhoun, N. M., et al.Perceived security, privacy, and trust concerns within Social Networking Sites: The role of Information sharing and relationships development in the Malaysian Higher Education Institutions’ marketingConferenceIEEE International Conference on Control System, Computing and Engineering
8[29]2011McKnight, D. H., et al.Social Networking Information Disclosure and Continuance Intention: A DisconnectConferenceHawaii International Conference on System Sciences
9[66]2011Stutzman, F., et al.Factors mediating disclosure in social network sitesJournalComputers in Human Behavior
10[67]2012Becker, L. and K. PousttchiSocial networks: the role of users’ privacy concernsConferenceInternational Conference on Information Integration and Web-based Applications & Services
11[68]2012Chen, R. and S. SharmaUnderstanding User Behavior at Social Networking Sites: A Relational Capital PerspectiveJournalJournal of Global Information Technology Management
12[69]2012Krasnova, H., et al.Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of CultureJournalBusiness & Information Systems Engineering
13[60]2012Lin, S.-W. and Y.-C. LiuThe effects of motivations, trust, and privacy concern in social networkingJournalService Business
14[70]2012Vitak, J.The Impact of Context Collapse and Privacy on Social Network Site DisclosuresJournalJournal of Broadcasting & Electronic Media
15[71]2012Zhao, L., et al.Disclosure Intention of Location-Related Information in Location-Based Social Network ServicesJournalInternational Journal of Electronic Commerce
16[30]2013Chen, R.Living a private life in public social networks: An exploration of member self-disclosureJournalDecision Support Systems
17[72]2013Chen, R. and S. K. SharmaSelf-disclosure at social networking sites: An exploration through relational capitalsJournalInformation Systems Frontiers
18[73]2013Dhami, A., et al.Impact of trust, security and privacy concerns in social networking: An exploratory study to understand the pattern of information revelation in FacebookConferenceIEEE International Advance Computing Conference
19[74]2013Kim, J. Y., et al.Why people use social networking services in Korea: The mediating role of self-disclosure on subjective well-beingJournalInformation Development
20[75]2013Liu, C., et al.Cognitive, personality, and social factors associated with adolescents’ online personal information disclosureJournalJournal of Adolescence
21[76]2013Salleh, N., et al.An Empirical Study of the Factors Influencing Information Disclosure Behaviour in Social Networking SitesConferenceInternational Conference on Advanced Computer Science Applications and Technologies
22[23]2013Taddei, S. and B. ContenaPrivacy, trust and control: Which relationships with online self-disclosureJournalComputers in Human Behavior
23[24]2013Xu, F., et al.Factors affecting privacy disclosure on social network sites: an integrated modelJournalElectronic Commerce Research
24[77]2014Sriratanaviriyakul, N., et al.Vietnamese privacy concerns and security in using online social networksJournalInternational Journal of Electronic Security and Digital Forensics
25[78]2014Alarcón-del-Amo, M.-d.-C., et al.Adoption of social networking sites by ItalianJournalInformation Systems and e-Business Management
26[26]2014Chang, C.-W. and J. HeoVisiting theories that predict college students’ self-disclosure on FacebookJournalComputers in Human Behavior
27[79]2014Chang, L. and J. V. ChenAligning principal and agent’s incentives: A principal–agent perspective of social networking sitesJournalExpert Systems with Applications
28[59]2014Mamonov, S. and M. KoufarisThe Impact of Perceived Privacy Breach on Sustainability of Social Networking SitesConferenceHawaii International Conference on System Sciences
29[80]2014Sharma, S. and R. E. CrosslerDisclosing too much? Situational factors affecting information disclosure in social commerce environmentJournalElectronic Commerce Research and Applications
30[81]2014Taddicken, M.The ‘Privacy Paradox’ in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure*JournalJournal of Computer-Mediated Communication
31[82]2015Benson, V., et al.Information disclosure of social media users: Does control over personal information, user awareness and security notices matterJournalInformation Technology & People
32[83]2015Azam, A.Model for individual information privacy disclosure in social commerce environmentJournalInternational Journal of Business Environment
33[84]2015Chen, H.-T. and W. ChenCouldn’t or wouldn’t? The influence of privacy concerns and self-efficacy in privacy management on privacy protectionJournalCyberpsychology, Behavior, and Social Networking
34[85]2015Cheung, C., et al.Self-disclosure in social networking sites: The role of perceived cost, perceived benefits and social influenceJournalInternet Research
35[86]2015Ernst, C.-P. H.Risk Hurts Fun: The Influence of Perceived Privacy Risk on Social Network Site UsageBook sectionSpringer Fachmedien Wiesbaden
36[87]2015Gerlach, J., et al.Handle with care: How online social network providers’ privacy policies impact users’ information sharing behaviorJournalThe Journal of Strategic Information Systems
37[88]2015Gupta, A. and A. DhamiMeasuring the impact of security, trust and privacy in information sharing: A study on social networking sitesJournalJournal of Direct, Data and Digital Marketing Practice
38[89]2015Min, J. and B. KimHow are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and costJournalJournal of the Association for Information Science and Technology
39[90]2015Nemec Zlatolas, L., et al.Privacy antecedents for SNS self-disclosure: The case of FacebookJournalComputers in Human Behavior
40[91]2015Shibchurn, J. and X. YanInformation disclosure on social networking sites: An intrinsic–extrinsic motivation perspectiveJournalComputers in Human Behavior
41[92]2016Chen, H., et al.Protecting Oneself Online:The Effects of Negative Privacy Experiences on Privacy Protective BehaviorsJournalJournalism & Mass Communication Quarterly
42[93]2016Dienlin, T. and M. J. MetzgerAn Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative U.S. SampleJournalJournal of Computer-Mediated Communication
43[94]2016Hajli, N. and X. LinExploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of InformationJournalJournal of Business Ethics
44[28]2016Heirman, W., et al.An open book on Facebook? Examining the interdependence of adolescents’ privacy regulation strategiesJournalBehaviour & Information Technology
45[95]2016Hina, S., et al.A Relational Study of Critical Threats and Risks Affecting the Potential Usage of Collaborative PatternJournalGlobal Journal of Flexible Systems Management
46[96]2016Kitsiou, A., et al.Digital privacy and social capital on social network sites. friends or foes?ConferenceACM
47[97]2016Li, K., et al.Information privacy disclosure on social network sites: an empirical investigation from social exchange perspectiveJournalNankai Business Review International
48[98]2016Liou, D.-K., et al.Investigating information sharing behavior: the mediating roles of the desire to share information in virtual communitiesJournalInformation Systems and e-Business Management
49[99]2016Malik, A., et al.Impact of privacy, trust and user activity on intentions to share Facebook photosJournalJournal of Information, Communication and Ethics in Society
50[100]2016Min, J.Personal information concerns and provision in social network sites: Interplay between secure preservation and true presentationJournalJournal of the Association for Information Science and Technology
51[101]2016Ng, M.Factors influencing the consumer adoption of Facebook: A two-country study of youth marketsJournalComputers in Human Behavior
52[21]2016Wang, T., et al.Intention to disclose personal information via mobile applications: A privacy calculus perspectiveJournalInternational Journal of Information Management
53[102]2017Chen, J. V., et al.Users’ intention to disclose location on location-based social network sites (LBSNS) in mobile environment: privacy calculus and Big FiveJournalInternational Journal of Mobile Communications
54[103]2017Hallam, C. and G. ZanellaOnline self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewardsJournalComputers in Human Behavior
55[104]2017Herrero, Á., et al.Explaining the adoption of social networks sites for sharing user-generated content: A revision of the UTAUT2JournalComputers in Human Behavior
56[105]2017James, T. L., et al.Exposing others’ information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control useJournalInformation & Management
57[106]2017Koohikamali, M., et al.Beyond self-disclosure: Disclosure of information about others in social network sitesJournalComputers in Human Behavior
58[107]2017Liu, Q., et al.Predicting users’ privacy boundary management strategies on FacebookJournalChinese Journal of Communication
59[108]2017Ozdemir, Z. D., et al.Antecedents and outcomes of information privacy concerns in a peer context: An exploratory studyJournalEuropean Journal of Information Systems
60[109]2017Trepte, S., et al.A Cross-Cultural Perspective on the Privacy CalculusJournalSocial Media + Society
61[110]2017Wang, L., et al.Let the users tell the truth: Self-disclosure intention and self-disclosure honesty in mobile social networkingJournalInternational Journal of Information Management
62[111]2018Chen, H.-T.Revisiting the Privacy Paradox on Social Media With an Extended Privacy Calculus Model: The Effect of Privacy Concerns, Privacy Self-Efficacy, and Social Capital on Privacy ManagementJournalAmerican Behavioral Scientist
63[112]2018Liu, Z. and X. WangHow to regulate individuals’ privacy boundaries on social network sites: A cross-cultural comparisonJournalInformation & Management
64[113]2018Millham, M. H. and D. AtkinManaging the virtual boundaries: Online social networks, disclosure, and privacy behaviorsJournalNew Media & Society
65[114]2018Osatuyi, B., et al.“Fool me once, shame on you… then, I learn.” An examination of information disclosure in social networking sitesJournalComputers in Human Behavior
66[115]2018Proudfoot, J. G., et al.Saving face on Facebook: privacy concerns, social benefits, and impression managementJournalBehaviour & Information Technology
67[116]2018Salehan, M., et al.A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behaviorJournalThe Journal of Supercomputing
68[117]2018Tsay-Vogel, M., et al.Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook usersJournalNew Media & Society
69[118]2018Z. H, G. O. H., et al.Regulation of Interpersonal Boundaries and its Effect on Self-Disclosure in Social Networking SitesConferenceInternational Conference on Advanced Technologies for Communications
70[119]2018Zhang, N., et al.Self-disclosure in Social Network Sites: An Integration of Stimulus-Organism-Response Paradigm and Privacy Calculus ModelConferenceWHICEB
71[120]2019Kroll, T. and S. StieglitzDigital nudging and privacy: improving decisions about self-disclosure in social networksJournalBehaviour & Information Technology
72[121]2019Fianu, E., et al.The Interplay Between Privacy, Trust and Self-disclosure on Social Networking SitesConferenceSpringer International Publishing
73[122]2019Lankton, N. K., et al.Understanding the Antecedents and Outcomes of Facebook Privacy Behaviors: An Integrated ModelJournalIEEE Transactions on Engineering Management
74[123]2019Li, P., et al.Unpacking the process of privacy management and self-disclosure from the perspectives of regulatory focus and privacy calculusJournalTelematics and Informatics
75[124]2019Lin, S. and D. ArmstrongBeyond Information: The Role of Territory in Privacy Management Behavior on Social Networking SitesJournalJournal of the Association for Information Systems
76[125]2019Liu, C., Lwin, M. and Ang, R.Parents’ role in teens’ personal photo sharing: A moderated mediation model incorporating privacy concern and network sizeJournalMakara Human Behavior Studies In Asia
77[126]2019Liu, Z., et al.How digital natives make their self-disclosure decisions: a cross-cultural comparisonJournalInformation Technology & People
78[127]2019Liu, Z., et al.The effect of role conflict on self-disclosure in social network sites: An integrated perspective of boundary regulation and dual process modelJournalInformation Systems Journal
79[128]2019Nemec Zlatolas, L., et al.A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social NetworksJournalEntropy
80[129]2019Oghazi, P., et al.User self-disclosure on social network sites: A cross-cultural study on Facebook’s privacy conceptsJournalJournal of Business Research
81[130]2019Sun, Y., et al.Investigating privacy and information disclosure behavior in social electronic commerceJournalSustainability
82[131]2019Teubner, T. and C. M. FlathPrivacy in the sharing economyJournalJournal of the Association for Information Systems
83[132]2019Wu, P. F.The privacy paradox in the context of online social networking: A self-identity perspectiveJournalJournal of the Association for Information Science and Technology
84[133]2019Zhang, S., et al.Does more accessibility lead to more disclosure? Exploring the influence of information accessibility on self-disclosure in online social networksJournalInformation Technology & People
85[134]2020Li, Y., Rho, E. H. R. and Kobsa, A.Cultural differences in the effects of contextual factors and privacy concerns on users’ privacy decision on social networking sitesJournalBehaviour & Information Technology
86[135]2020Al-laymoun, O. H. and Aljaafreh, A.Examining Users’ Willingness to Post Sensitive Personal Data on Social MediaJournalInternational journal of advanced computer science and applications
87[136]2020Jacobson, J., et al.Social media marketing: Who is watching the watchersJournalJournal of Retailing and Consumer Services
88[137]2020Li, K., et al.Voluntary sharing and mandatory provision: Private information disclosure on social networking sitesJournalInformation Processing & Management
89[138]2020Lin, X. and X. WangExamining gender differences in people’s information-sharing decisions on social networking sitesJournalInternational Journal of Information Management
90[139]2020Mousavi, R., Chen, R., Kim, D. J. and Chen, K.Effectiveness of privacy assurance mechanisms in users’ privacy protection on social networking sites from the perspective of protection motivation theoryJournalDecision Support Systems
91[140]2020Trepte, S., et al.The privacy calculus contextualized: The influence of affordancesJournalComputers in Human Behavior
92[141]2020Youn, S. and W. ShinAdolescents’ responses to social media newsfeed advertising: the interplay of persuasion knowledge, benefit-risk assessment, and ad scepticism in explaining information disclosureJournalInternational Journal of Advertising
93[142]2020Zhang, R., and Fu, J. S.Privacy Management and Self-Disclosure on Social Network Sites: The Moderating Effects of Stress and GenderJournalJournal of Computer-Mediated Communication
94[143]2020Davazdahemami, B., Hammer, B., Kalgotra, P. and Luse, A.From General to Situational Privacy Concerns: A New Mechanism to Explain Information Disclosure in Social NetworksJournalCommunications of the association for information systems
95[144]2021Chung, K.-C., Chen, C.-H., Tsai, H.-H. and Chuang, Y.-H.Social media privacy management strategies: A SEM analysis of user privacy behaviorsJournalComputer Communications
96[145]2021Ibrahim, M., Abdullah, A., Yulong, L., Maryah, A, and Fatmah Hussain, Q.Gender Differentials on Information Sharing and Privacy Concerns on Social Networking Sites: Perspectives From UsersJournalJournal of Global Information Management
97[146]2021Sharif, A., Soroya, S. H., Ahmad, S. and Mahmood, K.Antecedents of Self-Disclosure on Social Networking Sites (SNSs): A Study of Facebook UsersJournalSustainability
98[147]2021Thompson, N. and Brindley, J.Who are you talking about? Contrasting determinants of online disclosure about self or othersJournalInformation technology & people

Appendix B

Table A2. Scores for measurement parameters of the presented models.
Table A2. Scores for measurement parameters of the presented models.
Paper ID1.2.3.4.5.6.7.8.9.10.11.12.13.14.15.16.17.18.19.20.21.22.23.Sum of Scores
1010111000117111 100000.00.3109.42
2110101001801114.17111100.01.01116.33
3110101001801114.75111100.01.01116.51
40111110012591114.00111110.81.01119.26
5110001001529110 010000.01.01110.53
60111111105621114.29100000.00.51115.35
7011101001661113.75100100.00.50011.69
80101010014811114.86101100.01.01114.94
9110011001122110 100000.00.5109.62
1011111100116281117.25111100.01.01120.80
111111010012221113.00111000.01.01015.12
121111110011381114.80111000.00.51016.08
13011011000207111 011100.00.51011.71
140101010013641113.60000110.61.01013.04
151101110013681113.22111100.01.01117.33
160111010012221113.17111000.01.01115.17
171111010012221113.25111000.01.01015.20
181011110002461114.25100010.81.01115.32
190111110016531113.25111111.01.01119.63
200111010017801113.00100110.81.01015.48
210101010014861114.33011100.01.01114.79
22010111001718110 000000.00.5109.22
231100110011710013.86101110.81.01014.13
240101010012100016.00101110.81.01013.81
251101110016751114.17111010.81.01017.73
260111110011920113.00100110.20.51013.79
271111110013051115.43011110.81.01018.73
280101010006381114.00111100.01.01114.84
291101010019271013.44111110.81.01117.76
3011000100127391114.17100010.81.01015.79
311101010005140013.00100010.20.51111.11
320111010011701013.29111110.81.01116.96
330101110115150012.60000010.41.01011.70
340101010014051113.50011100.01.01114.46
350101010012201112.67111110.81.01116.82
3601011100111161113.33100000.00.51113.62
371101110002461114.25100010.81.01115.32
381101010013621113.83111111.01.01118.51
391111110016611113.71111111.01.01120.78
401111110012731115.60111111.01.01019.95
41110111111528111 100010.61.01016.13
4211011110111561116.00111010.61.01019.56
430111010114051113.80111100.01.01117.55
4401011100115641114.20100100.01.01115.82
451101010013801113.43111100.01.01116.41
460111110111031118.00000000.01.01014.50
471111110012911112.78111111.01.01120.12
480111110017271114.13111111.01.01119.96
490101110013781114.50111100.00.51116.23
501101010013961114.00111111.01.01118.60
510111110014761113.44111100.00.51016.01
521101010003271112.86011100.01.01114.18
531100110012981113.00011100.01.01014.20
541111010012221115.00101110.81.01017.52
551101010015371113.38111010.61.01117.15
5611110100111211114.17111100.01.01017.37
571101010013641114.18111100.01.01116.62
581101010014321116.11000100.00.51012.77
590101010013141115.29011100.01.01114.90
6011010100115501112.00100110.61.01015.75
611111010019131113.44011110.81.01118.75
6211011101130850115.17000000.00.51015.14
631101010018311114.21111100.00.51116.60
641101010016061012.57100000.00.51010.88
651101110013261114.86111111.01.01119.78
660110010012441114.43111110.61.01117.17
671101010011170115.17111100.01.01115.67
6801011100127891114.33100010.61.01016.69
690101110014541113.75101110.61.01016.18
701111010012101113.13111111.01.01018.15
711101110013821113.80100000.00.51013.02
721101010014520014.71111100.00.51013.37
731101111113051115.13111100.00.51018.34
741101111015251113.43101110.61.01018.15
751111010011681115.78111110.61.01119.50
76010101000 000 100000.01.0106.00
770101010014731114.22111100.01.01115.74
780111010011101113.50100100.01.01114.16
791111010016021113.33111110.81.01119.40
80011101001419110 000000.00.5108.92
811100010014061113.50111111.01.01117.46
821101010002371113.00111100.01.01115.14
831111010012491113.71111110.21.01118.56
840111010012130114.60111100.01.01115.59
8501011100111591114.86001110.61.01016.22
860111110015151113.57111100.01.01117.59
870111111017511113.38011100.01.01016.77
881100011103101112.75111100.01.01015.14
891111010014050113.57111100.01.01116.48
901101010013151114.11111100.01.01116.55
911101010011281113.50000010.61.01012.78
921101010013051015.20000110.81.01013.67
931101111115561112.71111010.61.01018.97
941110010011801114.33111100.01.01116.48
951110010003971115.17111100.01.01115.95
960111010014120113.40111110.81.01117.23
971101110014001114.17111100.01.01117.65
980101110002161114.20011100.01.01114.48

References

  1. Ellison, N.B.; Boyd, D.M. Sociality Through Social Network Sites. In The Oxford Handbook of Internet Studies; Dutton, W.H., Ed.; OUP Oxford: Oxford, UK, 2013. [Google Scholar]
  2. Most Popular Social Networks Worldwide as of October 2021, Ranked by Number of Active Users. Available online: https://0-www-statista-com.brum.beds.ac.uk/statistics/272014/global-social-networks-ranked-by-number-of-users (accessed on 19 November 2021).
  3. Laufer, R.S.; Wolfe, M. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory. J. Soc. Issues 1977, 33, 22–42. [Google Scholar] [CrossRef]
  4. Altman, I. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding; Brooks/Cole Pub. Co.: Monterey, CA, USA, 1975. [Google Scholar]
  5. Archer, J.L. The Self in Social Psychology. In Self-disclosure; Wegner, D., Vallacher, R., Eds.; Oxford University: London, UK, 1980; pp. 183–204. [Google Scholar]
  6. Susan, B.B. A privacy paradox: Social networking in the United States. First Monday 2006, 11, 9. [Google Scholar] [CrossRef]
  7. Byrne, B.M. Structural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming, 2nd ed.; Routledge: New York, NY, USA, 2010; p. 396. [Google Scholar]
  8. Valls Martínez, M.D.C.; Martín-Cervantes, P.A.; Sánchez Pérez, A.M.; Martínez Victoria, M.D.C. Learning Mathematics of Financial Operations during the COVID-19 Era: An Assessment with Partial Least Squares Structural Equation Modeling. Mathematics 2021, 9, 2120. [Google Scholar] [CrossRef]
  9. Nguyen, P.-H.; Tsai, J.-F.; Lin, M.-H.; Hu, Y.-C. A Hybrid Model with Spherical Fuzzy-AHP, PLS-SEM and ANN to Predict Vaccination Intention against COVID-19. Mathematics 2021, 9, 3075. [Google Scholar] [CrossRef]
  10. Holloway, I.W.; Dunlap, S.; del Pino, H.E.; Hermanstyne, K.; Pulsipher, C.; Landovitz, R.J. Online Social Networking, Sexual Risk and Protective Behaviors: Considerations for Clinicians and Researchers. Curr. Addict. Rep. 2014, 1, 220–228. [Google Scholar] [CrossRef] [Green Version]
  11. Jain, A.K.; Sahoo, S.R.; Kaubiyal, J. Online social networks security and privacy: Comprehensive review and analysis. Complex Intell. Syst. 2021, 7, 2157–2177. [Google Scholar] [CrossRef]
  12. Malekhosseini, R.; Hosseinzadeh, M.; Navi, K. An investigation into the requirements of privacy in social networks and factors contributing to users’ concerns about violation of their privacy. Soc. Netw. Anal. Min. 2018, 8, 41. [Google Scholar] [CrossRef]
  13. Masrom, M.B.; Busalim, A.H.; Abuhassna, H.; Mahmood, N.H.N. Understanding students’ behavior in online social networks: A systematic literature review. Int. J. Educ. Technol. High. Educ. 2021, 18, 6. [Google Scholar] [CrossRef]
  14. Rehman, Z.U.; Baharun, R.; Salleh, N.Z.M. Antecedents, consequences, and reducers of perceived risk in social media: A systematic literature review and directions for further research. Psychol. Mark. 2020, 37, 74–86. [Google Scholar] [CrossRef]
  15. Gerber, N.; Gerber, P.; Volkamer, M. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 2018, 77, 226–261. [Google Scholar] [CrossRef]
  16. James, T.L.; Warkentin, M.; Collignon, S.E. A dual privacy decision model for online social networks. Inf. Manag. 2015, 52, 893–908. [Google Scholar] [CrossRef]
  17. Petronio, S. Boundary of Privacy: Dialectics of Disclosure; State University of New York Press: Albany, NY, USA, 2002. [Google Scholar]
  18. Choi, B.C.F.; Land, L. The effects of general privacy concerns and transactional privacy concerns on Facebook apps usage. Inf. Manag. 2016, 53, 868–877. [Google Scholar] [CrossRef] [Green Version]
  19. Lewis, K.; Kaufman, J.; Christakis, N. The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network. J. Comput-Mediat. Comm. 2008, 14, 79–100. [Google Scholar] [CrossRef] [Green Version]
  20. Sun, Y.; Wang, N.; Shen, X.-L.; Zhang, J.X. Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences. Comput. Hum. Behav. 2015, 52, 278–292. [Google Scholar] [CrossRef]
  21. Wang, T.; Duong, T.D.; Chen, C.C. Intention to disclose personal information via mobile applications: A privacy calculus perspective. Int. J. Inf. Manag. 2016, 36, 531–542. [Google Scholar] [CrossRef]
  22. Lu, Y.; Yang, S.; Chau, P.Y.K.; Cao, Y. Dynamics between the trust transfer process and intention to use mobile payment services: A cross-environment perspective. Inf. Manag. 2011, 48, 393–403. [Google Scholar] [CrossRef]
  23. Taddei, S.; Contena, B. Privacy, trust and control: Which relationships with online self-disclosure? Comput. Hum. Behav. 2013, 29, 821–826. [Google Scholar] [CrossRef]
  24. Xu, F.; Michael, K.; Chen, X. Factors affecting privacy disclosure on social network sites: An integrated model. Electron. Commer. Res. 2013, 13, 151–168. [Google Scholar] [CrossRef]
  25. Feng, Y.; Xie, W. Teens’ concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Comput. Hum. Behav. 2014, 33, 153–162. [Google Scholar] [CrossRef]
  26. Chang, C.-W.; Heo, J. Visiting theories that predict college students’ self-disclosure on Facebook. Comput. Hum. Behav. 2014, 30, 79–86. [Google Scholar] [CrossRef]
  27. Hollenbaugh, E.E.; Ferris, A.L. Facebook self-disclosure: Examining the role of traits, social cohesion, and motives. Comput. Hum. Behav. 2014, 30, 50–58. [Google Scholar] [CrossRef]
  28. Heirman, W.; Walrave, M.; Vermeulen, A.; Ponnet, K.; Vandebosch, H.; Van Ouytsel, J.; Van Gool, E. An open book on Facebook? Examining the interdependence of adolescents’ privacy regulation strategies. Behav. Inf. Technol. 2016, 35, 706–719. [Google Scholar] [CrossRef] [Green Version]
  29. McKnight, D.H.; Lankton, N.; Tripp, J. Social Networking Information Disclosure and Continuance Intention: A Disconnect. Proceedings of 44th Hawaii International Conference on System Sciences (HICSS), Kauai, HI, USA, 4–7 January 2011; pp. 1–10. [Google Scholar]
  30. Chen, R. Living a private life in public social networks: An exploration of member self-disclosure. Decis. Support Syst. 2013, 55, 661–668. [Google Scholar] [CrossRef]
  31. Krasnova, H.; Kolesnikova, E.; Guenther, O. “It won’t happen to me!”: Self-disclosure in online social networks. Proceedings of Americas Conference on Information Systems. San Francisco, CA, USA, 2009., August 6-9.
  32. Wu, K.W.; Huang, S.Y.; Yen, D.C.; Popova, I. The effect of online privacy policy on consumer privacy concern and trust. Comput. Hum. Behav. 2012, 28, 889–897. [Google Scholar] [CrossRef]
  33. Troussas, C.; Virvou, M.; Espinosa, K.J. Using Visualization Algorithms for Discovering Patterns in Groups of Users for Tutoring Multiple Languages through Social Networking. J. Netw. 2015, 10, 668–674. [Google Scholar] [CrossRef]
  34. Dharsandiya, A.N.; Patel, M.R. A review on Frequent Itemset Mining algorithms in social network data. Proceedings of 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 23–25 March 2016; pp. 1046–1048. [Google Scholar]
  35. Dinev, T.; Hart, P. An extended privacy calculus model for E-commerce transactions. Inf. Syst. Res. 2006, 17, 61–80. [Google Scholar] [CrossRef]
  36. Krasnova, H.; Veltri, N.F. Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USA. Proceedings of 2010 43rd Hawaii International Conference on System Sciences, Honolulu, HI, USA, 5–8 January 2010; pp. 1–10. [Google Scholar]
  37. Culnan, M.J.; Armstrong, P.K. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organ. Sci. 1999, 10, 104–115. [Google Scholar] [CrossRef]
  38. Davis, F.D. A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and Results; Massachusetts Institute of Technology: Cambridge, MA, USA, 1985. [Google Scholar]
  39. Polančič, G.; Heričko, M.; Rozman, I. An empirical examination of application frameworks success based on technology acceptance model. J. Syst. Softw. 2010, 83, 574–584. [Google Scholar] [CrossRef]
  40. Fishbein, M.; Ajzen, I. Belief, attitude, intention, and behavior: An introduction to theory and research. Philos. Rhetor. 1977, 10, 130–132. [Google Scholar]
  41. Ajzen, I. From Intentions to Actions: A Theory of Planned Behavior. In Action Control: From Cognition to Behavior; Kuhl, J., Beckmann, J., Eds.; Springer Berlin Heidelberg: Berlin/Heidelberg, Germany, 1985; pp. 11–39. [Google Scholar]
  42. Lowry, P.B.; Gaskin, J. Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It. IEEE Trans. Prof. Commun. 2014, 57, 123–146. [Google Scholar] [CrossRef]
  43. Nunnaly, J. Psychometric Theory; McGraw-Hill: New York, NY, USA, 1978. [Google Scholar]
  44. Measures of Personality and Social Psychological Attitudes; Academic Press: Cambridge, UK, 1991; Volume 1.
  45. Chin, W.W. The partial least squares approach to structural equation modeling. Mod. Methods Bus. Res. 1998, 295, 295–336. [Google Scholar]
  46. Hair, J.F. Multivariate Data Analysis, 7th ed.; Prentice Hall: Upper Saddle River, NJ, USA, 2010; p. 785. [Google Scholar]
  47. dos Santos, P.M.; Cirillo, M.Â. Construction of the average variance extracted index for construct validation in structural equation models with adaptive regressions. Commun. Stat. Simul. Comput. 2021, 1–13. [Google Scholar] [CrossRef]
  48. DeCoster, J. Overview of Factor Analysis. 1998. Available online: http://www.stat-help.com/notes.html (accessed on 23 December 2021).
  49. Segars, A.H.; Grover, V. Re-Examining Perceived Ease of Use and Usefulness: A Confirmatory Factor Analysis. MIS Q. 1993, 17, 517–525. [Google Scholar] [CrossRef]
  50. Chin, W.W.; Todd, P.A. On the Use, Usefulness, and Ease of Use of Structural Equation Modeling in MIS Research: A Note of Caution. MIS Q. 1995, 19, 237–246. [Google Scholar] [CrossRef]
  51. Al Omoush, K.S.; Yaseen, S.G.; Atwah Alma’aitah, M. The impact of Arab cultural values on online social networking: The case of Facebook. Comput. Hum. Behav. 2012, 28, 2387–2399. [Google Scholar] [CrossRef]
  52. Facebook Expands to Include Work Networks. Available online: https://about.fb.com/news/2006/05/facebook-expands-to-include-work-networks-2/ (accessed on 23 August 2021).
  53. Programme, C.A.S. CASP Systematic Review Checklist. Available online: https://casp-uk.b-cdn.net/wp-content/uploads/2018/03/CASP-Systematic-Review-Checklist-2018_fillable-form.pdf (accessed on 23 August 2021).
  54. Hair, J.F.; Risher, J.J.; Sarstedt, M.; Ringle, C.M. When to use and how to report the results of PLS-SEM. Eur. Bus. Rev. 2019, 31, 2–24. [Google Scholar] [CrossRef]
  55. Hooper, D.; Coughlan, J.; Mullen, M. Evaluating model fit: A synthesis of the structural equation modelling literature. Proceedings of 7th European Conference on Research Methodology for Business and Management Studies, London, UK, 19–20 June 2008; pp. 195–200. [Google Scholar]
  56. Blunch, N.J. Introduction to Structural Equation Modeling Using IBM SPSS Statistics and AMOS, 2nd ed.; SAGE: Los Angeles, CA, USA, 2013; p. 303. [Google Scholar]
  57. Dwyer, C.; Hiltz, S.; Passerini, K. Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and Myspace. In AMCIS 2007 Proceedings; 2007; p. 339. Available online: https://aisel.aisnet.org/amcis2007/339/ (accessed on 19 November 2021).
  58. Krasnova, H.; Spiekermann, S.; Koroleva, K.; Hildebrand, T. Online social networks: Why we disclose. J. Inf. Technol. 2010, 25, 109–125. [Google Scholar] [CrossRef]
  59. Mamonov, S.; Koufaris, M. The Impact of Perceived Privacy Breach on Sustainability of Social Networking Sites. Proceedings of 2014 47th Hawaii International Conference on System Sciences, Waikoloa, HI, USA, 6–9 January 2014; pp. 1774–1784. [Google Scholar]
  60. Lin, S.-W.; Liu, Y.-C. The effects of motivations, trust, and privacy concern in social networking. Serv. Bus. 2012, 6, 411–424. [Google Scholar] [CrossRef]
  61. Lo, J. Privacy Concern, Locus of Control, and Salience in a Trust-Risk Model of Information Disclosure on Social Networking Sites. In AMCIS 2010 Proceedings; p. 110. Available online: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.475.529&rep=rep1&type=pdf (accessed on 19 November 2021).
  62. Lo, J.; Riemenschneider, C.K. An Examination of Privacy Concerns and Trust Entities in Determining Willingness to Disclose Personal Information on a Social Networking Site. AMCIS 2010 Proceedings. 2010, p. 46. Available online: https://aisel.aisnet.org/amcis2010/46/ (accessed on 19 November 2021).
  63. Posey, C.; Lowry, P.B.; Roberts, T.L.; Ellis, T.S. Proposing the online community self-disclosure model: The case of working professionals in France and the U.K. who use online communities. Eur. J. Inf. Syst. 2010, 19, 181–195. [Google Scholar] [CrossRef]
  64. Gibbs, J.L.; Ellison, N.B.; Lai, C.-H. First Comes Love, Then Comes Google: An Investigation of Uncertainty Reduction Strategies and Self-Disclosure in Online Dating. Commun. Res. 2011, 38, 70–100. [Google Scholar] [CrossRef] [Green Version]
  65. Almadhoun, N.M.; Dominic, P.D.D.; Lai Fong, W. Perceived security, privacy, and trust concerns within Social Networking Sites: The role of Information sharing and relationships development in the Malaysian Higher Education Institutions’ marketing. Proceedings of 2011 IEEE International Conference on Control System, Computing and Engineering, Penang, Malaysia, 25–27 November 2011; pp. 426–431. [Google Scholar]
  66. Stutzman, F.; Capra, R.; Thompson, J. Factors mediating disclosure in social network sites. Comput. Hum. Behav. 2011, 27, 590–598. [Google Scholar] [CrossRef] [Green Version]
  67. Becker, L.; Pousttchi, K. Social networks: The role of users’ privacy concerns. In Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, Bali, Indonesia, 3–5 December 2012; pp. 187–195. [Google Scholar]
  68. Chen, R.; Sharma, S. Understanding User Behavior at Social Networking Sites: A Relational Capital Perspective. J. Glob. Inf. Technol. Manag. 2012, 15, 25–45. [Google Scholar] [CrossRef]
  69. Krasnova, H.; Veltri, N.F.; Günther, O. Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of Culture. Bus. Inf. Syst. Eng. 2012, 4, 127–135. [Google Scholar] [CrossRef]
  70. Vitak, J. The Impact of Context Collapse and Privacy on Social Network Site Disclosures. J. Broadcasting Media 2012, 56, 451–470. [Google Scholar] [CrossRef]
  71. Zhao, L.; Lu, Y.; Gupta, S. Disclosure Intention of Location-Related Information in Location-Based Social Network Services. Int. J. Electron. Comm. 2012, 16, 53–90. [Google Scholar] [CrossRef]
  72. Chen, R.; Sharma, S.K. Self-disclosure at social networking sites: An exploration through relational capitals. Inf. Syst. Front. 2013, 15, 269–278. [Google Scholar] [CrossRef]
  73. Dhami, A.; Agarwal, N.; Chakraborty, T.K.; Singh, B.P.; Minj, J. Impact of trust, security and privacy concerns in social networking: An exploratory study to understand the pattern of information revelation in Facebook. Proceedings of 2013 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, India, 22–23 February 2013; pp. 465–469. [Google Scholar]
  74. Kim, J.Y.; Chung, N.; Ahn, K.M. Why people use social networking services in Korea: The mediating role of self-disclosure on subjective well-being. Inf. Dev. 2013, 30, 276–287. [Google Scholar] [CrossRef]
  75. Liu, C.; Ang, R.P.; Lwin, M.O. Cognitive, personality, and social factors associated with adolescents’ online personal information disclosure. J. Adolesc. 2013, 36, 629–638. [Google Scholar] [CrossRef]
  76. Salleh, N.; Hussein, R.; Mohamed, N.; Aditiawarman, U. An Empirical Study of the Factors Influencing Information Disclosure Behaviour in Social Networking Sites. Proceedings of 2013 International Conference on Advanced Computer Science Applications and Technologies, Kuching, Malaysia, 23–24 December 2013; pp. 181–185. [Google Scholar]
  77. Sriratanaviriyakul, N.; Nkhoma, M.; Felipe, A.L.; Cao, T.K.; Tran, Q.H. Vietnamese privacy concerns and security in using online social networks. Int. J. Electron. Secur. Digit. Forensics 2014, 6, 306–318. [Google Scholar] [CrossRef]
  78. Alarcón-del-Amo, M.-d.-C.; Lorenzo-Romero, C.; Del Chiappa, G. Adoption of social networking sites by Italian. Inf. Syst. e-Bus. Manag. 2014, 12, 165–187. [Google Scholar] [CrossRef]
  79. Chang, L.; Chen, J.V. Aligning principal and agent’s incentives: A principal–agent perspective of social networking sites. Expert Syst. Appl. 2014, 41, 3091–3104. [Google Scholar] [CrossRef]
  80. Sharma, S.; Crossler, R.E. Disclosing too much? Situational factors affecting information disclosure in social commerce environment. Electron. Commer. Res. Appl. 2014, 13, 305–319. [Google Scholar] [CrossRef]
  81. Taddicken, M. The ‘Privacy Paradox’ in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure*. J. Comput-Mediat. Comm. 2014, 19, 248–273. [Google Scholar] [CrossRef]
  82. Benson, V.; Saridakis, G.; Tennakoon, H. Information disclosure of social media users: Does control over personal information, user awareness and security notices matter? Inf. Technol. Amp People 2015, 28, 426–441. [Google Scholar] [CrossRef] [Green Version]
  83. Azam, A. Model for individual information privacy disclosure in social commerce environment. Int. J. Bus. Environ. 2015, 7, 302–326. [Google Scholar] [CrossRef]
  84. Chen, H.-T.; Chen, W. Couldn’t or wouldn’t? The influence of privacy concerns and self-efficacy in privacy management on privacy protection. Cyberpsychology Behav. Soc. Netw. 2015, 18, 13–19. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  85. Cheung, C.; Lee Zach, W.Y.; Chan Tommy, K.H. Self-disclosure in social networking sites: The role of perceived cost, perceived benefits and social influence. Internet Res. 2015, 25, 279–299. [Google Scholar] [CrossRef]
  86. Ernst, C.-P.H. Risk Hurts Fun: The Influence of Perceived Privacy Risk on Social Network Site Usage. In Factors Driving Social Network Site Usage; Springer Fachmedien Wiesbaden: Wiesbaden, Germany, 2015; pp. 45–56. [Google Scholar]
  87. Gerlach, J.; Widjaja, T.; Buxmann, P. Handle with care: How online social network providers’ privacy policies impact users’ information sharing behavior. J. Strateg. Inf. Syst. 2015, 24, 33–43. [Google Scholar] [CrossRef]
  88. Gupta, A.; Dhami, A. Measuring the impact of security, trust and privacy in information sharing: A study on social networking sites. J. Direct Data Digit. Mark. Pract. 2015, 17, 43–53. [Google Scholar] [CrossRef] [Green Version]
  89. Min, J.; Kim, B. How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost. J. Assoc. Inf. Sci. Technol. 2015, 66, 839–857. [Google Scholar] [CrossRef]
  90. Nemec Zlatolas, L.; Welzer, T.; Heričko, M.; Hölbl, M. Privacy antecedents for SNS self-disclosure: The case of Facebook. Comput. Hum. Behav. 2015, 45, 158–167. [Google Scholar] [CrossRef]
  91. Shibchurn, J.; Yan, X. Information disclosure on social networking sites: An intrinsic–extrinsic motivation perspective. Comput. Hum. Behav. 2015, 44, 103–117. [Google Scholar] [CrossRef]
  92. Chen, H.; Beaudoin, C.E.; Hong, T. Protecting Oneself Online:The Effects of Negative Privacy Experiences on Privacy Protective Behaviors. Journal. Mass Commun. Q. 2016, 93, 409–429. [Google Scholar] [CrossRef]
  93. Dienlin, T.; Metzger, M.J. An Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative, U.S. Sample. J. Comput-Mediat. Comm. 2016, 21, 368–383. [Google Scholar] [CrossRef] [Green Version]
  94. Hajli, N.; Lin, X. Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information. J. Bus. Ethics 2016, 133, 111–123. [Google Scholar] [CrossRef]
  95. Hina, S.; Dominic, P.D.D.; Ratnam, K.A. A Relational Study of Critical Threats and Risks Affecting the Potential Usage of Collaborative Pattern. Glob. J. Flex. Syst. Manag. 2016, 17, 373–388. [Google Scholar] [CrossRef]
  96. Kitsiou, A.; Tzortzaki, E.; Sideri, M.; Gritzalis, S. Digital privacy and social capital on social network sites. In friends or foes? In Proceedings of Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, Los Angeles, CA, USA, 5 December 2016; pp. 3–16. [Google Scholar]
  97. Li, K.; Wang, X.; Li, k.; Che, J. Information privacy disclosure on social network sites: An empirical investigation from social exchange perspective. Nankai Bus. Rev. Int. 2016, 7, 282–300. [Google Scholar] [CrossRef]
  98. Liou, D.-K.; Chih, W.-H.; Hsu, L.-C.; Huang, C.-Y. Investigating information sharing behavior: The mediating roles of the desire to share information in virtual communities. Inf. Syst. e-Bus. Manag. 2016, 14, 187–216. [Google Scholar] [CrossRef]
  99. Malik, A.; Hiekkanen, K.; Dhir, A.; Nieminen, M. Impact of privacy, trust and user activity on intentions to share Facebook photos. J. Inf. Commun. Ethics Soc. 2016, 14, 364–382. [Google Scholar] [CrossRef]
  100. Min, J. Personal information concerns and provision in social network sites: Interplay between secure preservation and true presentation. J. Assoc. Inf. Sci. Technol. 2016, 67, 26–42. [Google Scholar] [CrossRef]
  101. Ng, M. Factors influencing the consumer adoption of Facebook: A two-country study of youth markets. Comput. Hum. Behav. 2016, 54, 491–500. [Google Scholar] [CrossRef]
  102. Chen, J.V.; Su, B.C.; Quyet, H.M. Users’ intention to disclose location on location-based social network sites (LBSNS) in mobile environment: Privacy calculus and Big Five. Int. J. Mob. Commun. 2017, 15, 329–353. [Google Scholar] [CrossRef]
  103. Hallam, C.; Zanella, G. Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Comput. Hum. Behav. 2017, 68, 217–227. [Google Scholar] [CrossRef]
  104. Herrero, Á.; San Martín, H.; Garcia-De los Salmones, M.d.M. Explaining the adoption of social networks sites for sharing user-generated content: A revision of the UTAUT2. Comput. Hum. Behav. 2017, 71, 209–217. [Google Scholar] [CrossRef] [Green Version]
  105. James, T.L.; Wallace, L.; Warkentin, M.; Kim, B.C.; Collignon, S.E. Exposing others’ information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use. Inf. Manag. 2017, 54, 851–865. [Google Scholar] [CrossRef]
  106. Koohikamali, M.; Peak, D.A.; Prybutok, V.R. Beyond self-disclosure: Disclosure of information about others in social network sites. Comput. Hum. Behav. 2017, 69, 29–42. [Google Scholar] [CrossRef]
  107. Liu, Q.; Yao, M.Z.; Yang, M.; Tu, C. Predicting users’ privacy boundary management strategies on Facebook. Chin. J. Commun. 2017, 10, 295–311. [Google Scholar] [CrossRef]
  108. Ozdemir, Z.D.; Jeff Smith, H.; Benamati, J.H. Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. Eur. J. Inf. Syst. 2017, 26, 642–660. [Google Scholar] [CrossRef]
  109. Trepte, S.; Reinecke, L.; Ellison, N.B.; Quiring, O.; Yao, M.Z.; Ziegele, M. A Cross-Cultural Perspective on the Privacy Calculus. Soc. Media Soc. 2017, 3, 2056305116688035. [Google Scholar] [CrossRef] [Green Version]
  110. Wang, L.; Yan, J.; Lin, J.; Cui, W. Let the users tell the truth: Self-disclosure intention and self-disclosure honesty in mobile social networking. Int. J. Inf. Manag. 2017, 37, 1428–1440. [Google Scholar] [CrossRef] [Green Version]
  111. Chen, H.-T. Revisiting the Privacy Paradox on Social Media With an Extended Privacy Calculus Model: The Effect of Privacy Concerns, Privacy Self-Efficacy, and Social Capital on Privacy Management. Am. Behav. Sci. 2018, 62, 1392–1412. [Google Scholar] [CrossRef] [Green Version]
  112. Liu, Z.; Wang, X. How to regulate individuals’ privacy boundaries on social network sites: A cross-cultural comparison. Inf. Manag. 2018, 55, 1005–1023. [Google Scholar] [CrossRef]
  113. Millham, M.H.; Atkin, D. Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors. New Media Soc. 2018, 20, 50–67. [Google Scholar] [CrossRef]
  114. Osatuyi, B.; Passerini, K.; Ravarini, A.; Grandhi, S.A. “Fool me once, shame on you… then, I learn.” An examination of information disclosure in social networking sites. Comput. Hum. Behav. 2018, 83, 73–86. [Google Scholar] [CrossRef]
  115. Proudfoot, J.G.; Wilson, D.; Valacich, J.S.; Byrd, M.D. Saving face on Facebook: Privacy concerns, social benefits, and impression management. Behav. Inf. Technol. 2018, 37, 16–37. [Google Scholar] [CrossRef] [Green Version]
  116. Salehan, M.; Kim, D.J.; Koo, C. A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behavior. J. Supercomput. 2018, 74, 3596–3619. [Google Scholar] [CrossRef]
  117. Tsay-Vogel, M.; Shanahan, J.; Signorielli, N. Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users. New Media Soc. 2018, 20, 141–161. [Google Scholar] [CrossRef]
  118. Goh, Z.H.; Cho, H.; Li, P. Regulation of Interpersonal Boundaries and its Effect on Self-Disclosure in Social Networking Sites. In Proceedings of the 2018 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, Vietnam, 18–20 October 2018; pp. 305–309. [Google Scholar]
  119. Zhang, N.; Pang, J.; Wan, J. Self-Disclosure in Social Network Sites: An Integration of Stimulus-Organism-Response Paradigm and Privacy Calculus Model. In Proceedings of the International Conference on e-Business, Wuhan, China, 30 June 2018. [Google Scholar]
  120. Kroll, T.; Stieglitz, S. Digital nudging and privacy: Improving decisions about self-disclosure in social networks. Behav. Inf. Technol. 2021, 40, 1–19. [Google Scholar] [CrossRef]
  121. Fianu, E.; Ofori, K.S.; Boateng, R.; Ampong, G.O.A. The Interplay Between Privacy, Trust and Self-disclosure on Social Networking Sites. In ICT Unbounded, Social Impact of Bright ICT Adoption. TDIT 2019. IFIP Advances in Information and Communication Technology; Dwivedi, Y., Ayaburi, E., Boateng, R., Effah, J., Eds.; Springer: Cham, Switzerland, 2019; Volume 558. [Google Scholar] [CrossRef]
  122. Lankton, N.K.; McKnight, D.H.; Tripp, J.F. Understanding the Antecedents and Outcomes of Facebook Privacy Behaviors: An Integrated Model. IEEE Trans. Eng. Manag. 2020, 67, 697–711. [Google Scholar] [CrossRef]
  123. Li, P.; Cho, H.; Goh, Z.H. Unpacking the process of privacy management and self-disclosure from the perspectives of regulatory focus and privacy calculus. Telemat. Inform. 2019, 41, 114–125. [Google Scholar] [CrossRef]
  124. Lin, S.; Armstrong, D. Beyond Information: The Role of Territory in Privacy Management Behavior on Social Networking Sites. J. Assoc. Inf. Syst. 2019, 20, 2. [Google Scholar] [CrossRef] [Green Version]
  125. Liu, C.; Lwin, M.; Ang, R. Parents’ role in teens’ personal photo sharing: A moderated mediation model incorporating privacy concern and network size Makara Hum. Behav. Stud. Asia 2019, 23, 145–151. [Google Scholar] [CrossRef]
  126. Liu, Z.; Wang, X.; Liu, J. How digital natives make their self-disclosure decisions: A cross-cultural comparison. Inf. Technol. Amp People 2019, 32, 538–558. [Google Scholar] [CrossRef]
  127. Liu, Z.; Wang, X.; Min, Q.; Li, W. The effect of role conflict on self-disclosure in social network sites: An integrated perspective of boundary regulation and dual process model. Inf. Syst. J. 2019, 29, 279–316. [Google Scholar] [CrossRef]
  128. Nemec Zlatolas, L.; Welzer, T.; Hölbl, M.; Heričko, M.; Kamišalić, A. A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks. Entropy 2019, 21, 772. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  129. Oghazi, P.; Schultheiss, R.; Chirumalla, K.; Kalmer, N.P.; Rad, F.F. User self-disclosure on social network sites: A cross-cultural study on Facebook’s privacy concepts. J. Bus. Res. 2019, 112, 531–540. [Google Scholar] [CrossRef]
  130. Sun, Y.; Fang, S.; Hwang, Y. Investigating privacy and information disclosure behavior in social electronic commerce. Sustainability 2019, 11, 3311. [Google Scholar] [CrossRef] [Green Version]
  131. Teubner, T.; Flath, C.M. Privacy in the sharing economy. J. Assoc. Inf. Syst. 2019, 20, 213–242. [Google Scholar] [CrossRef]
  132. Wu, P.F. The privacy paradox in the context of online social networking: A self-identity perspective. J. Assoc. Inf. Sci. Technol. 2019, 70, 207–217. [Google Scholar] [CrossRef]
  133. Zhang, S.; Kwok Ron, C.-W.; Lowry Paul, B.; Liu, Z. Does more accessibility lead to more disclosure? Exploring the influence of information accessibility on self-disclosure in online social networks. Inf. Technol. Amp People 2019, 32, 754–780. [Google Scholar] [CrossRef]
  134. Li, Y.; Rho, E.H.R.; Kobsa, A. Cultural differences in the effects of contextual factors and privacy concerns on users’ privacy decision on social networking sites. Behav. Inf. Technol. 2020, 1–23. [Google Scholar] [CrossRef]
  135. Al-laymoun, O.H.; Aljaafreh, A. Examining Users’ Willingness to Post Sensitive Personal Data on Social Media. Int. J. Adv. Comput. Sci. Appl. 2020, 11, 451–458. [Google Scholar] [CrossRef]
  136. Jacobson, J.; Gruzd, A.; Hernández-García, Á. Social media marketing: Who is watching the watchers? J. Retail. Consum. Serv. 2020, 53, 101774. [Google Scholar] [CrossRef]
  137. Li, K.; Cheng, L.; Teng, C.-I. Voluntary sharing and mandatory provision: Private information disclosure on social networking sites. Inf. Process. Manag. 2020, 57, 102128. [Google Scholar] [CrossRef]
  138. Lin, X.; Wang, X. Examining gender differences in people’s information-sharing decisions on social networking sites. Int. J. Inf. Manag. 2020, 50, 45–56. [Google Scholar] [CrossRef]
  139. Mousavi, R.; Chen, R.; Kim, D.J.; Chen, K. Effectiveness of privacy assurance mechanisms in users’ privacy protection on social networking sites from the perspective of protection motivation theory. Decis. Support Syst. 2020, 135, 113323. [Google Scholar] [CrossRef]
  140. Trepte, S.; Scharkow, M.; Dienlin, T. The privacy calculus contextualized: The influence of affordances. Comput. Hum. Behav. 2020, 104, 106115. [Google Scholar] [CrossRef]
  141. Youn, S.; Shin, W. Adolescents’ responses to social media newsfeed advertising: The interplay of persuasion knowledge, benefit-risk assessment, and ad scepticism in explaining information disclosure. Int. J. Advert. 2020, 39, 213–231. [Google Scholar] [CrossRef]
  142. Zhang, R.; Fu, J.S. Privacy Management and Self-Disclosure on Social Network Sites: The Moderating Effects of Stress and Gender. J. Comput-Mediat. Comm. 2020, 25, 236–251. [Google Scholar] [CrossRef]
  143. Davazdahemami, B.; Hammer, B.; Kalgotra, P.; Luse, A. From General to Situational Privacy Concerns: A New Mechanism to Explain Information Disclosure in Social Networks. Commun. Assoc. Inf. Syst. 2020, 47, 652–677. [Google Scholar] [CrossRef]
  144. Chung, K.-C.; Chen, C.-H.; Tsai, H.-H.; Chuang, Y.-H. Social media privacy management strategies: A SEM analysis of user privacy behaviors. Comput. Commun. 2021, 174, 122–130. [Google Scholar] [CrossRef]
  145. Ibrahim, M.; Abdullah, A.; Yulong, L.; Maryah, A.; Fatmah Hussain, Q. Gender Differentials on Information Sharing and Privacy Concerns on Social Networking Sites: Perspectives from Users. J. Glob. Inf. 2021, 29, 236–255. [Google Scholar] [CrossRef]
  146. Sharif, A.; Soroya, S.H.; Ahmad, S.; Mahmood, K. Antecedents of Self-Disclosure on Social Networking Sites (SNSs): A Study of Facebook Users. Sustainability 2021, 13, 1220. [Google Scholar] [CrossRef]
  147. Thompson, N.; Brindley, J. Who are you talking about? Contrasting determinants of online disclosure about self or others. Inf. Technol. People 2021, 34, 999–1017. [Google Scholar] [CrossRef]
Figure 1. Flow diagram of the search.
Figure 1. Flow diagram of the search.
Mathematics 10 00146 g001
Figure 2. Number of citations for all publications per year for all papers and number of papers per publication type per year.
Figure 2. Number of citations for all publications per year for all papers and number of papers per publication type per year.
Mathematics 10 00146 g002
Figure 3. Frequency of theories used in papers by year of publication.
Figure 3. Frequency of theories used in papers by year of publication.
Mathematics 10 00146 g003
Figure 4. Number of studies done in each country.
Figure 4. Number of studies done in each country.
Mathematics 10 00146 g004
Figure 5. Coefficient of determination (R2) for privacy and the disclosure factor in studies and the number of participants in the studies.
Figure 5. Coefficient of determination (R2) for privacy and the disclosure factor in studies and the number of participants in the studies.
Mathematics 10 00146 g005
Figure 6. Average sum of scores per year of publication and theory type, and the average sum of scores for papers with theories or no theory behind the model.
Figure 6. Average sum of scores per year of publication and theory type, and the average sum of scores for papers with theories or no theory behind the model.
Mathematics 10 00146 g006
Figure 7. Average scores for each of the 23 measurement parameters by year of publication.
Figure 7. Average scores for each of the 23 measurement parameters by year of publication.
Mathematics 10 00146 g007
Table 1. Summary of search results.
Table 1. Summary of search results.
SpringerIEEESDACMWoSGoogle ScholarTotal
Search done inAll textMetadata OnlyTitle, abstract or keywordsTitle, author keywords, abstractTitle/TopicRelevance
Search results (Search done on)6733 (400)66472035535,100 (500)42,321 (1388)
Number of suitable results for inclusion after screening2062027613137
Percentage of results used for detailed screening5.00%9.09%42.55%10.00%21.41%2.60%9.87%
Table 2. Measurement parameters.
Table 2. Measurement parameters.
ParametersPossible Points Received
1. Theory presentedYes—1.00, No—0.00
2. Content validityYes—1.00, No—0.00
3. Pre-testYes—1.00, No—0.00
4.Scale explainedYes—1.00, No—0.00
5.Year of researchYes—1.00, No—0.00
6.Sample frame (who was invited)Yes—1.00, No—0.00
7.Random samplingYes—1.00, No—0.00
8.Response rate over 20%Yes—1.00, No—0.00
9.Country of researchYes—1.00, No—0.00
10.Number of participants who responded to the surveyNumber of participants
11.Age of participantsYes—1.00, No—0.00
12.Gender ratio of participantsYes—1.00, No—0.00
13.Multi-item variablesYes—1.00, No—0.00
14.Average number of items per variableNumber of items per variable
15.Convergent validity Cronbach’s alphaYes—1.00, No—0.00
16.Composite reliabilityYes—1.00, No—0.00
17.Average variance extractedYes—1.00, No—0.00
18.Construct validityYes—1.00, No—0.00
19.Confirmatory methods Yes—1.00, No—0.00
20.χ2, NFI, GFI, CFI, RMSEA0.20 points for each confirmatory method
21.Form of the presented results Text—0.30 points, Table—0.50 points, Picture—1.00 points
22.Internal validityYes—1.00, No—0.00
23.Coefficient of determination (R2) resultsYes—1.00, No—0.00
Table 3. Journals or conferences in which more than one selected paper was published.
Table 3. Journals or conferences in which more than one selected paper was published.
Publication TypeJournal/ConferenceNumber of Papers Published
JournalComputers in Human Behavior11
JournalJournal of the Association for Information Science and Technology5
JournalBehaviour & Information Technology4
JournalInformation Technology & People4
ConferenceAMCIS3
JournalInternational Journal of Information Management3
JournalJournal of Computer-Mediated Communication3
JournalDecision Support Systems2
JournalEuropean Journal of Information Systems2
ConferenceHawaii International Conference on System Sciences2
JournalInformation & Management2
JournalInformation Systems and e-Business Management2
JournalNew Media & Society2
JournalSustainability2
Table 4. Most commonly used background theories for the models.
Table 4. Most commonly used background theories for the models.
Theory Used in PapersNumber of Papers the Theory Was Used in
Privacy calculus20
Communication privacy management (CPM)18
Technology acceptance model (TAM)7
Theory of reasoned action (TRA)5
Theory of planned behavior (TPB)3
Social capital theory (SCT)2
Protection motivation theory (PMT)2
Construal level theory (CLT)1
Unified Theory of Acceptance and Use of Technology (UTAUT2)1
Concern about others’ privacy (COP)1
Disclosure of information about others (DIO)1
Social penetration theory (SPT)1
Social role theory (SRT)1
Table 5. Descriptive statistics of the measurement parameters.
Table 5. Descriptive statistics of the measurement parameters.
MinMaxMeanS.D.
1. Theory presented0.001.000.590.49
2. Content validity0.001.000.990.10
3. Pre-test0.001.000.400.49
4.Scale explained0.001.000.890.32
5.Year of research0.001.000.430.50
6.Sample frame (who was invited)0.001.001.000.00
7.Random sampling0.001.000.080.28
8.Response rate over 20%0.001.000.090.29
9.Country of research0.001.000.870.34
10.Number of participants who responded to the survey663085521.89527.92
11.Age of participants0.001.000.880.33
12.Gender ratio of participants0.001.000.900.30
13.Multi-item variables0.001.000.950.22
14.Average number of items per variable2.008.004.041.02
15.Convergent validity Cronbach’s alpha0.001.000.790.41
16.Composite reliability0.001.000.640.48
17.Average variance extracted0.001.000.700.46
18.Construct validity0.001.000.710.45
19.Confirmatory methods 0.001.000.450.50
20.χ2, NFI, GFI, CFI, RMSEA0.001.000.330.39
21.Form of the presented results 0.301.000.900.21
22.Internal validity0.001.000.990.10
23.Coefficient of determination (R2) results0.001.000.550.50
Table 6. Results of the probit model.
Table 6. Results of the probit model.
Dependent Variable: Convergent ValidityBStd. Dev.Hypothesis Test
Wald Chi-SquareSig.
Theory presented0.8370.25610.6750.001
Construct validity1.0720.27914.7880.000
Coefficient of determination1.0990.26217.6050.000
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Nemec Zlatolas, L.; Hrgarek, L.; Welzer, T.; Hölbl, M. Models of Privacy and Disclosure on Social Networking Sites: A Systematic Literature Review. Mathematics 2022, 10, 146. https://0-doi-org.brum.beds.ac.uk/10.3390/math10010146

AMA Style

Nemec Zlatolas L, Hrgarek L, Welzer T, Hölbl M. Models of Privacy and Disclosure on Social Networking Sites: A Systematic Literature Review. Mathematics. 2022; 10(1):146. https://0-doi-org.brum.beds.ac.uk/10.3390/math10010146

Chicago/Turabian Style

Nemec Zlatolas, Lili, Luka Hrgarek, Tatjana Welzer, and Marko Hölbl. 2022. "Models of Privacy and Disclosure on Social Networking Sites: A Systematic Literature Review" Mathematics 10, no. 1: 146. https://0-doi-org.brum.beds.ac.uk/10.3390/math10010146

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop