Twitter Privacy Concern: The Effect of Twitter Profile
The Effect of Twitter Profile
Privacy concern vary from one to another. Sensitive information related to finance and health are most of the concern. The vast spread of using social media/ micro-blogging platforms, i.e. Twitter, as a desirable channel of online communication, has changed the peoples' understanding of what is private communication and whether they should or should not be concerned about their privacy. This paper examines the relationship between the level of privacy concern of Twitter users and their gender, experience on Twitter, type of their Twitter account and type of their username. A survey in the form of a questionnaire has been conducted in Saudi Arabia. The research compares privacy concern from the perspective of male and female, old and new Twitter users, private and public account holders and nickname and real name username holders. Determining the Chi square and using T-test and ANOVA, this research shows that the individual’s privacy concerns are affected by the Twitter users’ profile; gender, number of the years on Twitter, the type of Twitter account and username.
Saudi Arabia Social Media Statistics 2018, from: https://www.globalmediainsight.com/blog/saudi-arabia-social-media-statistics/
Michael Zimmer and Nicholas Proferes from: Weller, Katrin, et al. Twitter and society. Vol. 89. Peter Lang, 2014.
Warren, S., L., Brandeis, (1890), “The right to privacy”. Harvard Law Review. 4(1), pp. 193–220.
Seničar, V. Blazič, B., and Klobučar, T., (2003), “Privacy-Enhancing Technologies-approaches and development”. Computer Standards and Interfaces, 25, pp.147-158
Stahl, B., (2004), “Responsibility for Information Assurance and Privacy”. Journal of Organizational and End User Computing, 16, (3), pp. 59 - 77
Al Amri, Jehad; Fairweather, N. Ben; Howley, Richard G.; Wilford, S. (Saudi Students Clubs, 2012)
Tavani, H., (2008), “Informational privacy: concepts, theories and controversies”. In K.E. Himma & H.T. Tavani (EDS), The Handbook of Information and Computer Ethics. Hoboken, N.J., Wiley
Kemp, R and Moor, A., (2007), “Privacy”. In Library Hi Tech, 25, (1), pp. 58-78
Brandimarte, L, Acquisti, A., and Loewenstein, G., (2010), Misplaced Confidences: Privacy and the Control Paradox. Technical report, Mimeo, Carnegie: Mellon University
Field, A., (2009), Discovering statistics using SPSS (3rd edition.), Sage Publications Ltd, 1 Oliver’s Yard, 55 City Road, London EC1Y 1SP
Pallent, J., (2001), SPSS Survival Manual. SPSS Inc., Chicago, USA.
Shane-Simpson, C., Manago, A., Gaggi, N. and Gillespie-Lynch, K., 2018. Why do college students prefer Facebook, Twitter, or Instagram? Site affordances, tensions between privacy and self-expression, and implications for social capital. Computers in Human Behavior, 86, pp.276-288.
Hughes, R.J., Rapiscan Systems Inc, 2012. Personnel security screening system with enhanced privacy. U.S. Patent 8,135,112
Erz, A., Marder, B. and Osadchaya, E., 2018. Hashtags: Motivational drivers, their use, and differences between influencers and followers. Computers in Human Behavior, 89, pp.48-60.
Fiesler, C. and Proferes, N., 2018. “Participant” Perceptions of Twitter Research Ethics. Social Media+ Society, 4(1), p.2056305118763366.
Kwak, H., Lee, C., Park, H. and Moon, S., 2010, April. What is Twitter, a social network or a news media?. In Proceedings of the 19th international conference on World wide web (pp. 591-600). AcM.
Page, R., 2012. The linguistics of self-branding and micro-celebrity in Twitter: The role of hashtags. Discourse & communication, 6(2), pp.181-201.
McGoogan, C., 2017. Hashtag Turns 10: Seven Facts You Didn’t Know about the Trending Symbol. The Telegraph.
C. Courtois, P. Mechant, L. De Marez, G. Verleye, Gratifications and Seeding Behavior of Online Adolescents, Journal of Computer-Mediated Communication, Volume 15, Issue 1, 1 October 2009, Pages 109–137
Scott, K., 2015. The pragmatics of hashtags: Inference and conversational style on Twitter. Journal of Pragmatics, 81, pp.8-20.
Zappavigna, M., 2017. 8. Twitter. Pragmatics of Social Media, 11, p.201.
Tufekci, Z., 2014, May. Big questions for social media big data: Representativeness, validity and other methodological pitfalls. In Eighth International AAAI Conference on Weblogs and Social Media.
Fiesler, C., Dye, M., Feuston, J.L., Hiruncharoenvate, C., Hutto, C.J., Morrison, S., Khanipour Roshan, P., Pavalanathan, U., Bruckman, A.S., De Choudhury, M. and Gilbert, E., 2017, February. What (or who) is public?: Privacy settings and social media content sharing. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (pp. 567-580). ACM.
Webb, H., Jirotka, M., Stahl, B.C., Housley, W., Edwards, A., Williams, M., Procter, R., Rana, O. and Burnap, P., 2017, June. The ethical challenges of publishing Twitter data for research dissemination. In Proceedings of the 2017 ACM on Web Science Conference (pp. 339-348). ACM.
Reidenberg, J.R., Breaux, T., Cranor, L.F., French, B., Grannis, A., Graves, J.T., Liu, F., McDonald, A., Norton, T.B. and Ramanath, R., 2015. Disagreeable privacy policies: Mismatches between meaning and users' understanding. Berkeley Tech. LJ, 30, p.39.
Meeder, B., Tam, J., Kelley, P.G. and Cranor, L.F., 2010, May. RT@ IWantPrivacy: Widespread violation of privacy settings in the Twitter social network. In Proceedings of the Web (Vol. 2, pp. 1-2).
Proferes, N., 2017. Information flow solipsism in an exploratory study of beliefs about Twitter. Social Media+ Society, 3(1), p.2056305117698493.
Williams, M.L., Burnap, P. and Sloan, L., 2017. Towards an ethical framework for publishing Twitter data in social research: Taking into account users’ views, online context and algorithmic estimation. Sociology, 51(6), pp.1149-1168.
Mao, H., Shuai, X. and Kapadia, A., 2011, October. Loose tweets: an analysis of privacy leaks on twitter. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society (pp. 1-12). ACM.
Smith, H., Milberg, S., and Burke, S., (1996), “Information Privacy: Measuring Individuals' Concerns about Organizational Practices”. MIS Quarterly: Management Information System, 20, pp.167.
Dinev, T. and Hart, P., (2003), “Privacy concerns and Internet use – a model of trade-off factors”. Best Paper Proceedings of Annual Academy of Management Meeting. Seattle.
Dinev, T., and Hart, P., (2004), “Internet privacy concerns and their antecedents- measurement validity and a regression model”. Behavior & Information Technology, 23(6), pp.413-422
Dinev, T., and Hart, P., (2006a), “Internet privacy and social awareness as determinants of Intention to transact”. International Journal of Electronic Commerce, 10(2), pp.7-29
Dinev, T., and Hart, P., (2006b), “An extended privacy calculus model for e-commerce transactions”, Information Systems Research, 17(1), pp.61-80
Xu, H., Dinev, T., Smith, H. J., and Hart, P., (2008), “Examining the formation of individual’s information privacy concerns: toward an integrative view”. In Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008), Paris, France
Donath J (2007) Signals in social supernets. J Comput Mediated Commun 13(1). http://jcmc.indiana.edu/vol13/issue1/donath.html.
Hoy MG, Milne G (2010) Gender differences in privacy-related measures for young adult facebook users. J Interactive Advertising 10(2):28–45
Thelwall, M., 2011. Privacy and gender in the social web. In Privacy Online (pp. 251-265). Springer, Berlin, Heidelberg.
Stefanone, M.A., Yue, Z. and Toh, Z., 2019. A social cognitive approach to traditional media content and social media use: Selfie-related behavior as competitive strategy. new media & society, 21(2), pp.317-335.
Clark-Gordon, C.V., Bowman, N.D., Goodboy, A.K. and Wright, A., 2019. Anonymity and Online Self-Disclosure: A Meta-Analysis. Communication Reports, 32(2), pp.98-111.
Marwick, A. and Hargittai, E., 2019. Nothing to hide, nothing to lose? Incentives and disincentives to sharing information with institutions online. Information, Communication & Society, 22(12), pp.1697-1713.
Trepte, S. and Reinecke, L. eds., 2011. Privacy online: Perspectives on privacy and self-disclosure in the social web. Springer Science & Business Media.
Copyright (c) 2020 Jehad Al Amri
This work is licensed under a Creative Commons Attribution 4.0 International License.
The author warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).