Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social Media
Drawing on digital identity theories, social software engineering theory (SSE), and the Privacy Safeguard (PriS) methodology, we examined the way that personal information uploaded on social media (SM) imposes privacy issues. Throughout a review on users’ self-representation on SM, we examined the i...
Saved in:
Published in | Future internet Vol. 14; no. 9; p. 249 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
01.09.2022
|
Subjects | |
Online Access | Get full text |
ISSN | 1999-5903 1999-5903 |
DOI | 10.3390/fi14090249 |
Cover
Abstract | Drawing on digital identity theories, social software engineering theory (SSE), and the Privacy Safeguard (PriS) methodology, we examined the way that personal information uploaded on social media (SM) imposes privacy issues. Throughout a review on users’ self-representation on SM, we examined the impact of self-determination and self-disclosure on users’ privacy, and we identified the social attributes (SA) that cause privacy implications. This paper specifies 18 SA that users employ to achieve their optimal level of representation while summarizing possible ways that these attributes provoke users’ identification. In particular, our research has shown that SM users represent their personas by unveiling SA to construct popular, representative, and conversational profiles. As disclosing SA increases privacy implications, we intend to help users build profiles that respect their privacy. Examining users’ SA deepens our understanding of disclosing personal information on SM while leading to a better quantification of identity attributes; furthermore, users’ top five most revealing attributes were summarized. Considering that SSE addresses users’ privacy implications from an early stage of systems designing, our research, identifying the SA, will be helpful in addressing privacy from a socio-technical aspect, aiming at bridging the socio-technical gap by drawing designers’ attention to users’ social aspects. |
---|---|
AbstractList | Drawing on digital identity theories, social software engineering theory (SSE), and the Privacy Safeguard (PriS) methodology, we examined the way that personal information uploaded on social media (SM) imposes privacy issues. Throughout a review on users’ self-representation on SM, we examined the impact of self-determination and self-disclosure on users’ privacy, and we identified the social attributes (SA) that cause privacy implications. This paper specifies 18 SA that users employ to achieve their optimal level of representation while summarizing possible ways that these attributes provoke users’ identification. In particular, our research has shown that SM users represent their personas by unveiling SA to construct popular, representative, and conversational profiles. As disclosing SA increases privacy implications, we intend to help users build profiles that respect their privacy. Examining users’ SA deepens our understanding of disclosing personal information on SM while leading to a better quantification of identity attributes; furthermore, users’ top five most revealing attributes were summarized. Considering that SSE addresses users’ privacy implications from an early stage of systems designing, our research, identifying the SA, will be helpful in addressing privacy from a socio-technical aspect, aiming at bridging the socio-technical gap by drawing designers’ attention to users’ social aspects. |
Author | Kitsiou, Angeliki Kalloniatis, Christos Vgena, Katerina Gritzalis, Stefanos |
Author_xml | – sequence: 1 givenname: Katerina orcidid: 0000-0001-7619-4014 surname: Vgena fullname: Vgena, Katerina – sequence: 2 givenname: Angeliki surname: Kitsiou fullname: Kitsiou, Angeliki – sequence: 3 givenname: Christos orcidid: 0000-0002-8844-2596 surname: Kalloniatis fullname: Kalloniatis, Christos – sequence: 4 givenname: Stefanos orcidid: 0000-0002-8037-2191 surname: Gritzalis fullname: Gritzalis, Stefanos |
BookMark | eNptkUtKBDEQhoMo-Nx4ggZ3wmiS7qQ7S_E5oCg-1qGSrmiGtqNJRpid1_B6nsQeR1HE2lRRfPXzV9U6We5Dj4RsM7pXloruO88qqiiv1BJZY0qpkVC0XP5Vr5KtlCZ0iFJxKes18nCEGeOj731_X-QHLK5Dh0VwxU2wHrpi3GKffZ4VBzlHb6YZU5HDJ3kVQ0abfejn_F3CmN5f34a2fwE7K3z_rXGBrYdNsuKgS7j1lTfI3cnx7eHZ6PzydHx4cD6ypWR5VNFaSQe8cdw2NWugRmiEMVhyBo0xhjuhUA4bAAfjjGqVaqmjgtUcW9GUG2S80G0DTPRT9I8QZzqA15-NEO81xOxth5pZzozitGRCVpK6RgquWMUEVMJU3A5aOwutpxiep5iynoRp7Af7mtdsoBkVcqDogrIxpBTRaeszzO-SI_hOM6rn79E_7xlGdv-MfBv9B_4AOGuRFg |
CitedBy_id | crossref_primary_10_3390_fi14110328 crossref_primary_10_1007_s12144_025_07364_3 crossref_primary_10_3390_fi15040123 crossref_primary_10_1007_s10207_024_00946_5 |
Cites_doi | 10.1109/ISTAS.2010.5514641 10.1002/9781118321607.ch23 10.1007/978-3-030-27813-7_1 10.1016/j.cose.2015.07.002 10.1109/MPRV.2003.1186726 10.1016/j.clsr.2018.02.002 10.1177/0165551519879702 10.1177/1461444814543995 10.1108/ICS-12-2021-0211 10.1108/ICS-06-2016-0044 10.3390/fi11110234 10.1080/23738871.2017.1366536 10.1080/01449290801987292 10.1016/j.pmcj.2019.03.001 10.1111/1540-4560.00072 10.1016/j.sbspro.2012.11.102 10.1111/jcom.12106 10.1007/978-3-030-42048-2_11 10.4324/9780203876527 10.1111/jcc4.12052 10.1145/1102199.1102214 10.1080/13576500342000103 10.1145/1882362.1882370 10.1177/0539018408092575 10.1177/1461444812450679 10.1177/0270467607311484 10.1111/1540-4560.00071 10.1016/j.chb.2008.02.012 10.1177/1461444817714790 10.1145/1540276.1540279 10.1007/978-3-030-95484-0_9 10.1177/1461444814531364 10.1002/9781118321607 10.1080/15252019.2010.10722168 10.1109/ACCESS.2018.2822260 10.1016/j.comnet.2014.11.008 10.3390/info11020057 10.1016/j.appdev.2008.12.010 10.1177/2056305118763349 10.1007/s00766-008-0067-3 10.1016/j.chb.2015.12.050 10.1177/1461444820981009 10.1080/08989575.2017.1289007 10.1177/1461444815605454 10.1007/978-3-642-21521-6 10.3390/socsci7100191 10.1080/17489725.2011.642820 10.1093/oxfordhb/9780199561803.013.0016 10.1177/1461444816660731 10.1109/TKDE.2011.259 10.1080/13803611.2015.1024009 10.1145/3503823.3503857 10.1177/0163443712468605 10.1145/2628363.2628406 10.1016/j.jss.2015.04.084 10.1177/1354856510394539 10.14778/1921071.1921080 10.1515/til-2019-0003 10.1177/1461444810365313 10.1145/2593968.2593984 |
ContentType | Journal Article |
Copyright | 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8FD 8FE 8FG 8FK 8FL ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI Q9U DOA |
DOI | 10.3390/fi14090249 |
DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection ProQuest One Community College ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database AAdvanced Technologies & Aerospace Database (subscription) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Business (OCUL) ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central Basic DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
DatabaseTitleList | CrossRef Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1999-5903 |
ExternalDocumentID | oai_doaj_org_article_1c21b9203156460f865291415a45b42c 10_3390_fi14090249 |
GroupedDBID | -DT .4I 5VS 7WY 8FE 8FG 8FL AADQD AAFWJ AAKPC AAYXX ABDBF ABUWG ACIHN ADBBV ADMLS AEAQA AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BCNDV BENPR BEZIV BGLVJ BPHCQ CCPQU CITATION DWQXO E3Z EAP EBS EJD ESX FRNLG GNUQQ GROUPED_DOAJ HCIFZ IAO ICD ITC K60 K6V K6~ K7- KQ8 M0C MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PQBIZ PQBZA PQQKQ PROAC RNS TR2 3V. 7SC 7XB 8AL 8FD 8FK ACUHS JQ2 L.- L7M L~C L~D M0N PKEHL PQEST PQGLB PQUKI Q9U PUEGO |
ID | FETCH-LOGICAL-c361t-40796fa28f2c8718a7ea85bbe321a8bbb2f59e6000a2abfb9d99d0f05172ed583 |
IEDL.DBID | DOA |
ISSN | 1999-5903 |
IngestDate | Wed Aug 27 01:30:11 EDT 2025 Fri Jul 25 03:33:29 EDT 2025 Tue Jul 01 01:24:58 EDT 2025 Thu Apr 24 22:56:12 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 9 |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c361t-40796fa28f2c8718a7ea85bbe321a8bbb2f59e6000a2abfb9d99d0f05172ed583 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-8037-2191 0000-0001-7619-4014 0000-0002-8844-2596 |
OpenAccessLink | https://doaj.org/article/1c21b9203156460f865291415a45b42c |
PQID | 2716521056 |
PQPubID | 2032396 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_1c21b9203156460f865291415a45b42c proquest_journals_2716521056 crossref_citationtrail_10_3390_fi14090249 crossref_primary_10_3390_fi14090249 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-09-01 |
PublicationDateYYYYMMDD | 2022-09-01 |
PublicationDate_xml | – month: 09 year: 2022 text: 2022-09-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Future internet |
PublicationYear | 2022 |
Publisher | MDPI AG |
Publisher_xml | – name: MDPI AG |
References | Powell (ref_54) 2019; 20 Westin (ref_61) 2003; 59 Marwick (ref_59) 2014; 16 Kiranmayee (ref_2) 2015; 6 ref_13 Zhao (ref_48) 2008; 24 ref_12 Shafie (ref_46) 2012; 65 ref_11 Curzon (ref_27) 2019; 55 ref_52 Kalloniatis (ref_49) 2016; 6 ref_19 ref_17 Talbot (ref_31) 2022; 24 ref_15 Maple (ref_29) 2017; 2 Wachter (ref_28) 2018; 34 Stutzman (ref_75) 2006; 3 Satchell (ref_33) 2011; 30 Schwartz (ref_8) 2015; 17 Lutz (ref_65) 2017; 3 Tufekci (ref_71) 2008; 28 Lenberg (ref_4) 2015; 107 Beam (ref_56) 2018; 20 Feher (ref_72) 2021; 47 ref_24 ref_68 ref_67 ref_22 ref_64 Pempek (ref_74) 2009; 30 ref_62 (ref_47) 2013; 35 Arthur (ref_55) 2017; 32 Hodkinson (ref_60) 2017; 19 Shanahan (ref_40) 2018; 20 Kalloniatis (ref_5) 2008; 13 Brandtzaeg (ref_57) 2018; 4 Eastin (ref_66) 2016; 58 ref_70 Kokolakis (ref_42) 2017; 64 Taddicken (ref_16) 2014; 19 (ref_18) 2015; 21 ref_36 Marwick (ref_51) 2011; 17 Marwick (ref_58) 2011; 13 Gritzalis (ref_21) 2019; Volume 11711 ref_34 ref_78 ref_77 ref_32 ref_76 Zhou (ref_14) 2008; 10 ref_73 Wessels (ref_35) 2012; 14 ref_39 ref_37 Margulis (ref_6) 2003; 59 Sicari (ref_30) 2015; 76 Liu (ref_10) 2018; 6 Kalloniatis (ref_50) 2017; 25 ref_82 Yuan (ref_63) 2010; 4 ref_81 Yuan (ref_38) 2013; 25 ref_80 Myles (ref_20) 2003; 2 Austin (ref_23) 2019; 20 Bazarova (ref_53) 2014; 64 ref_44 ref_43 Lahlou (ref_26) 2008; 47 ref_41 Ismail (ref_69) 2010; 1 ref_3 Almudawi (ref_1) 2016; 22 Biernat (ref_79) 2004; 3 ref_9 Hoy (ref_45) 2010; 10 ref_7 Michael (ref_25) 2011; 5 |
References_xml | – ident: ref_9 doi: 10.1109/ISTAS.2010.5514641 – ident: ref_13 doi: 10.1002/9781118321607.ch23 – volume: Volume 11711 start-page: 3 year: 2019 ident: ref_21 article-title: Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing publication-title: Trust, Privacy and Security in Digital Business doi: 10.1007/978-3-030-27813-7_1 – ident: ref_78 – volume: 64 start-page: 122 year: 2017 ident: ref_42 article-title: Privacy Attitudes and Privacy Behaviour: A Review of Current Research on the Privacy Paradox Phenomenon publication-title: Comput. Secur. doi: 10.1016/j.cose.2015.07.002 – volume: 2 start-page: 56 year: 2003 ident: ref_20 article-title: Preserving Privacy in Environments with Location-Based Applications publication-title: IEEE Pervasive Comput. doi: 10.1109/MPRV.2003.1186726 – volume: 22 start-page: 29 year: 2016 ident: ref_1 article-title: Cloud Computing Privacy Concerns in Social Networks publication-title: Int. J. Comput. – volume: 34 start-page: 436 year: 2018 ident: ref_28 article-title: Normative Challenges of Identification in the Internet of Things: Privacy, Profiling, Discrimination, and the GDPR publication-title: Comput. Law Secur. Rev. doi: 10.1016/j.clsr.2018.02.002 – volume: 47 start-page: 192 year: 2021 ident: ref_72 article-title: Digital Identity and the Online Self: Footprint Strategies—An Exploratory and Comparative Research Study publication-title: J. Inf. Sci. doi: 10.1177/0165551519879702 – ident: ref_68 – volume: 16 start-page: 1051 year: 2014 ident: ref_59 article-title: Networked Privacy: How Teenagers Negotiate Context in Social Media publication-title: New Media Soc. doi: 10.1177/1461444814543995 – ident: ref_67 doi: 10.1108/ICS-12-2021-0211 – volume: 25 start-page: 614 year: 2017 ident: ref_50 article-title: Incorporating Privacy in the Design of Cloud-Based Systems: A Conceptual Meta-Model publication-title: Inf. Comput. Secur. doi: 10.1108/ICS-06-2016-0044 – ident: ref_81 doi: 10.3390/fi11110234 – ident: ref_39 – volume: 2 start-page: 155 year: 2017 ident: ref_29 article-title: Security and Privacy in the Internet of Things publication-title: J. Cyber Policy doi: 10.1080/23738871.2017.1366536 – volume: 30 start-page: 51 year: 2011 ident: ref_33 article-title: Identity Crisis: User Perspectives on Multiplicity and Control in Federated Identity Management publication-title: Behav. Inf. Technol. doi: 10.1080/01449290801987292 – volume: 55 start-page: 76 year: 2019 ident: ref_27 article-title: A Survey of Privacy Enhancing Technologies for Smart Cities publication-title: Pervasive Mob. Comput. doi: 10.1016/j.pmcj.2019.03.001 – volume: 59 start-page: 431 year: 2003 ident: ref_61 article-title: Social and Political Dimensions of Privacy publication-title: J. Soc. Issues doi: 10.1111/1540-4560.00072 – volume: 65 start-page: 134 year: 2012 ident: ref_46 article-title: Constructing Identity through Facebook Profiles: Online Identity and Visual Impression Management of University Students in Malaysia publication-title: Procedia Soc. Behav. Sci. doi: 10.1016/j.sbspro.2012.11.102 – volume: 64 start-page: 635 year: 2014 ident: ref_53 article-title: Self-Disclosure in Social Media: Extending the Functional Approach to Disclosure Motivations and Characteristics on Social Network Sites publication-title: J. Commun. doi: 10.1111/jcom.12106 – volume: 20 start-page: 1 year: 2019 ident: ref_54 article-title: Learner security & privacy risks: How usage of online social media outside a learning management system affects learners’ digital identity publication-title: Issues Inf. Syst. – ident: ref_34 doi: 10.1007/978-3-030-42048-2_11 – ident: ref_70 doi: 10.4324/9780203876527 – volume: 6 start-page: 2 year: 2016 ident: ref_49 article-title: Increasing Internet Users Trust in the Cloud Computing Era: The Role of Privacy publication-title: J. Mass Commun. Journal. – ident: ref_77 – volume: 19 start-page: 248 year: 2014 ident: ref_16 article-title: The ‘Privacy Paradox’ in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure publication-title: J. Comput.-Mediat. Comm. doi: 10.1111/jcc4.12052 – ident: ref_44 doi: 10.1145/1102199.1102214 – volume: 3 start-page: 143 year: 2004 ident: ref_79 article-title: The Social and Personal Identities Scale: A Measure of the Differential Importance Ascribed to Social and Personal Self-Categorizations publication-title: Self Identity doi: 10.1080/13576500342000103 – ident: ref_7 doi: 10.1145/1882362.1882370 – volume: 47 start-page: 299 year: 2008 ident: ref_26 article-title: Identity, Social Status, Privacy and Face-Keeping in Digital Society publication-title: Soc. Sci. Inf. doi: 10.1177/0539018408092575 – ident: ref_41 – volume: 14 start-page: 1251 year: 2012 ident: ref_35 article-title: Identification and the Practices of Identity and Privacy in Everyday Digital Communication publication-title: New Media Soc. doi: 10.1177/1461444812450679 – volume: 28 start-page: 20 year: 2008 ident: ref_71 article-title: Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites publication-title: Bull. Sci. Technol. Soc. doi: 10.1177/0270467607311484 – ident: ref_17 – volume: 59 start-page: 411 year: 2003 ident: ref_6 article-title: On the Status and Contribution of Westin’s and Altman’s Theories of Privacy publication-title: J. Soc. Issues doi: 10.1111/1540-4560.00071 – volume: 24 start-page: 1816 year: 2008 ident: ref_48 article-title: Identity Construction on Facebook: Digital Empowerment in Anchored Relationships publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2008.02.012 – volume: 1 start-page: 14 year: 2010 ident: ref_69 article-title: An Evaluation of Students’ Identity-Sharing Behaviour in Social Network Communities as Preparation for Knowledge Sharing. Ismail, Shahrinaz. An evaluation of students’ identity-sharing behavior in social network communities as preparation for knowledge sharing publication-title: Int. J. Adv. Sci. Arts – volume: 20 start-page: 2296 year: 2018 ident: ref_56 article-title: Context Collapse and Privacy Management: Diversity in Facebook Friends Increases Online News Reading and Sharing publication-title: New Media Soc. doi: 10.1177/1461444817714790 – volume: 10 start-page: 12 year: 2008 ident: ref_14 article-title: A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data publication-title: SIGKDD Explor. Newsl. doi: 10.1145/1540276.1540279 – ident: ref_82 doi: 10.1007/978-3-030-95484-0_9 – volume: 17 start-page: 1643 year: 2015 ident: ref_8 article-title: The Spatial Self: Location-Based Identity Performance on Social Media publication-title: New Media Soc. doi: 10.1177/1461444814531364 – ident: ref_52 doi: 10.1002/9781118321607 – volume: 6 start-page: 1509 year: 2015 ident: ref_2 article-title: A Survey on the Role of Cloud Computing in Social Networking Sites publication-title: Int. J. Comput. Sci. Inf. Technol. – volume: 10 start-page: 28 year: 2010 ident: ref_45 article-title: Gender Differences in Privacy-Related Measures for Young Adult Facebook Users publication-title: J. Interact. Advert. doi: 10.1080/15252019.2010.10722168 – ident: ref_76 – ident: ref_24 – volume: 6 start-page: 17606 year: 2018 ident: ref_10 article-title: Location Privacy and Its Applications: A Systematic Study publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2822260 – volume: 76 start-page: 146 year: 2015 ident: ref_30 article-title: Security, Privacy and Trust in Internet of Things: The Road Ahead publication-title: Comput. Netw. doi: 10.1016/j.comnet.2014.11.008 – ident: ref_3 doi: 10.3390/info11020057 – ident: ref_11 – volume: 30 start-page: 227 year: 2009 ident: ref_74 article-title: College Students’ Social Networking Experiences on Facebook publication-title: J. Appl. Dev. Psychol. doi: 10.1016/j.appdev.2008.12.010 – volume: 4 start-page: 205630511876334 year: 2018 ident: ref_57 article-title: Time Collapse in Social Media: Extending the Context Collapse publication-title: Soc. Media Soc. doi: 10.1177/2056305118763349 – volume: 13 start-page: 241 year: 2008 ident: ref_5 article-title: Addressing Privacy Requirements in System Design: The PriS Method publication-title: Requir. Eng. doi: 10.1007/s00766-008-0067-3 – volume: 58 start-page: 214 year: 2016 ident: ref_66 article-title: Living in a Big Data World: Predicting Mobile Commerce Activity through Privacy Concerns publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2015.12.050 – ident: ref_37 – volume: 24 start-page: 1729 year: 2022 ident: ref_31 article-title: The Management of LGBTQ+ Identities on Social Media: A Student Perspective publication-title: New Media Soc. doi: 10.1177/1461444820981009 – volume: 32 start-page: 371 year: 2017 ident: ref_55 article-title: Data Portraits: Identity, Privacy, and Surveillance publication-title: Auto/Biogr. Stud. doi: 10.1080/08989575.2017.1289007 – volume: 19 start-page: 272 year: 2017 ident: ref_60 article-title: Bedrooms and beyond: Youth, Identity and Privacy on Social Network Sites publication-title: New Media Soc. doi: 10.1177/1461444815605454 – ident: ref_62 doi: 10.1007/978-3-642-21521-6 – ident: ref_80 doi: 10.3390/socsci7100191 – volume: 5 start-page: 121 year: 2011 ident: ref_25 article-title: The Social and Behavioural Implications of Location-Based Services publication-title: J. Locat. Based Serv. doi: 10.1080/17489725.2011.642820 – ident: ref_15 doi: 10.1002/9781118321607 – volume: 3 start-page: 2056305117697735 year: 2017 ident: ref_65 article-title: Where Dating Meets Data: Investigating Social and Institutional Privacy Concerns on Tinder publication-title: Soc. Media – ident: ref_12 doi: 10.1093/oxfordhb/9780199561803.013.0016 – volume: 20 start-page: 141 year: 2018 ident: ref_40 article-title: Social Media Cultivating Perceptions of Privacy: A 5-Year Analysis of Privacy Attitudes and Self-Disclosure Behaviors among Facebook Users publication-title: New Media Soc. doi: 10.1177/1461444816660731 – volume: 25 start-page: 633 year: 2013 ident: ref_38 article-title: Protecting Sensitive Labels in Social Network Data Anonymization publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/TKDE.2011.259 – volume: 21 start-page: 139 year: 2015 ident: ref_18 article-title: “You Don’t Look like Your Profile Picture”: The Ethical Implications of Researching Online Identities in Higher Education publication-title: Educ. Res. Eval. doi: 10.1080/13803611.2015.1024009 – ident: ref_64 – ident: ref_22 doi: 10.1145/3503823.3503857 – volume: 35 start-page: 199 year: 2013 ident: ref_47 article-title: ‘You Have One Identity’: Performing the Self on Facebook and LinkedIn publication-title: Media Cult. Soc. doi: 10.1177/0163443712468605 – ident: ref_73 doi: 10.1145/2628363.2628406 – volume: 107 start-page: 15 year: 2015 ident: ref_4 article-title: Behavioral Software Engineering: A Definition and Systematic Literature Review publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2015.04.084 – volume: 17 start-page: 139 year: 2011 ident: ref_51 article-title: To See and Be Seen: Celebrity Practice on Twitter publication-title: Convergence doi: 10.1177/1354856510394539 – ident: ref_36 – ident: ref_19 – ident: ref_43 – volume: 4 start-page: 141 year: 2010 ident: ref_63 article-title: Personalized Privacy Protection in Social Networks publication-title: Proc. VLDB Endow. doi: 10.14778/1921071.1921080 – volume: 20 start-page: 53 year: 2019 ident: ref_23 article-title: Re-Reading Westin publication-title: Theor. Inq. Law doi: 10.1515/til-2019-0003 – volume: 3 start-page: 10 year: 2006 ident: ref_75 article-title: An Evaluation of Identity-Sharing Behavior in Social Network Communities publication-title: J. Int. Digit. Media Arts Assoc. – volume: 13 start-page: 114 year: 2011 ident: ref_58 article-title: I Tweet Honestly, I Tweet Passionately: Twitter Users, Context Collapse, and the Imagined Audience publication-title: New Media Soc. doi: 10.1177/1461444810365313 – ident: ref_32 doi: 10.1145/2593968.2593984 |
SSID | ssj0000392667 |
Score | 2.2465937 |
Snippet | Drawing on digital identity theories, social software engineering theory (SSE), and the Privacy Safeguard (PriS) methodology, we examined the way that personal... |
SourceID | doaj proquest crossref |
SourceType | Open Website Aggregation Database Enrichment Source Index Database |
StartPage | 249 |
SubjectTerms | Access control Cloud computing Design Digital media Identification Identity Information systems Interdisciplinary aspects Internet of Things Principles Privacy Representations Social factors social media Social networks Social norms socio-technical theory Software Software engineering Virtual private networks |
SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1La9wwEB7SzaU9hD7pJmkQNJceTCxZlqVDKUmTEApZQuhCbkaSpXYhrPNwC7nlb_Tv9Zd0xpY3LS09Wh6M0Ujz0Gi-D2BXqdIEI2MWC6UzqbjNTMV5ZkvhpeWYNjuq6J7O1MlcfrooL9ZgNvbC0LXK0Sb2hrppPZ2R7wkM7NHVoL_-cHWdEWsUVVdHCg2bqBWa9z3E2CNYR5Nc5hNYPzianZ2vTl1yDAeUqgac0gLz_b24IMgnAs77wzP1AP5_2efe6Rw_hY0ULbL9Qb3PYC0sn8OT3zAEX8DXw3ShBZ8YRnPsvL0MrI1saLxlqRP3ju13A7lVuGVd20ueDRgNqBmSn1Pf5c_7Hzi8-G79HVssx29QNce-hPnx0eePJ1miT8h8oXiHmWFlVLRCR-ExLdK2ClaXzoVCcKudcyKinjDgya2wLjrTGNPkkUC7RGhKXbyCybJdhtfAorDKKcFVkF5iAmkqr2UTtCeOCCP0FN6NU1f7hC1OFBeXNeYYNM31wzRP4e1K9mpA1Pin1AFpYCVBKNj9QHvzpU6bquZecGcE_YSSKo8aV4jhGJJYWTop_BS2R_3VaWve1g8LafP_r7fgsaBeh_5C2TZMuptv4Q1GIJ3bScvqF12y2kE priority: 102 providerName: ProQuest |
Title | Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social Media |
URI | https://www.proquest.com/docview/2716521056 https://doaj.org/article/1c21b9203156460f865291415a45b42c |
Volume | 14 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NSsQwEA66XvQg_uL6swT04qHYpGmaHLeuVQRlWVzwVpJsgguyFbcK3nwNX88ncdJ2dUXBi6fSMLRlZpqZj8x8g9AR57G0krnARVwEjBMVyISQQMXUMEUANmt_ont1zS-G7PI2vp0b9eVrwmp64FpxJ8RQoiX1wwg446ETPKaSQNhRLNaMGr_7hjKcA1PVHgxhn_Ok5iONANefuLGndvIEed8iUEXU_2MfroJLtoZWm6wQd-uvWUcLdrKBVua4AjfRXa8pXIE7DFkbHhT3FhcO1w22uOm4fcHdsh5iZae4LCrJfs3FABbw8kPfX_n--gbL42dlXvB4MnuGP7VRW2iYnd2cXgTNmITARJyUgAATyZ2iwlED8EeoxCoRa20jSpTQWlMH9oDEJlRUaaflSMpR6Dw5F7WjWETbqDUpJnYHYUcV15wSbplhABRlYgQbWWG8-iUVbXQ8U11uGg5xP8riPgcs4dWcf6m5jQ4_ZR9q5oxfpVJvgU8Jz3ZdLYAP5I0P5H_5QBvtz-yXN7_gNKeABCE3gQRv9z_esYeWqe98qMrL9lGrfHyyB5CPlLqDFkV23kFL3bSXZnBNz677g07lkB-qCN3q |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NbtQwELbK9gAcEL_qQgFLwIFD1NhxHPtQoZa22tJ2VVVdqbdgOzasVG1KN4D2xmvwMjwMT8JM4mxBIG49xhlZyXjsmbE930fISylz7bUIScikSoRkJtEFY4nJuROGQdps8UT3aCxHE_HuLD9bIT_6Whi8Vtmvie1CXdUO98g3OAT24GrAX7-5-JQgaxServYUGiZSK1SbLcRYLOw48IuvkMLNN_d3YLxfcb63e_p2lESWgcRlkjWQQBVaBsNV4A6yB2UKb1Rurc84M8paywP8DsQFqeHGBqsrras0ILYV91WuMuj3BlkVuIEyIKvbu-Pjk-UuTwrhh5RFh4uaZTrdCFOEmEKgvj88YUsY8Jc_aJ3c3l1yJ0andKszp3tkxc_uk9u_YRY-IB934gUaeKIQPdKT-tzTOtCu0JfGyt8F3Wo6Mi0_p03dSh53mBBgCSg_wTrPn9--Q_P0i3ELOp31feDpkXlIJteiyEdkMKtnfo3QwI20kjPphROQsOrCKVF55ZCTQnM1JK971ZUuYpkjpcZ5CTkNqrm8UvOQvFjKXnQIHv-U2sYRWEog6nbbUF9-KOMkLpnjzGqOHyGFTIMCi9QMQiAjciu4G5L1fvzKuBTMyyvDffz_18_JzdHp0WF5uD8-eEJucayzaC-zrZNBc_nZP4Xop7HPoolR8v66rfoX1vQXuQ |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NbtQwELZKKyE4IH7FQgFLwIFDtLHjOPahQi3bVUthtapYqbdgOzasVG1KN4D2xmvwSjwGT8JM4mxBIG49JhlZyXjimbFnvo-QZ1Lm2msRkpBJlQjJTKILxhKTcycMg7TZ4onu24k8mInXJ_nJBvnR98JgWWW_JrYLdVU73CMfcgjswdWAvx6GWBYxHY1fnn1KkEEKT1p7Og0TaRaqnRZuLDZ5HPnVV0jnljuHI5j755yP99-9Okgi40DiMskaSKYKLYPhKnAHmYQyhTcqt9ZnnBllreUBPg1ihNRwY4PVldZVGhDnivsqVxmMe4VsFeD1IRHc2tufTI_XOz4phCJSFh1GapbpdBjmCDeFoH1_eMWWPOAv39A6vPFNciNGqnS3M61bZMMvbpPrv-EX3iEfR7GYBq4oRJL0uD71tA60a_qlsQt4RXebjljLL2lTt5LTDh8CrALlZ9jz-fPbd7g9_2Lcis4X_Rh4kmTuktmlKPIe2VzUC3-f0MCNtJIz6YUTkLzqwilReeWQn0JzNSAvetWVLuKaI73GaQn5Daq5vFDzgDxdy551aB7_lNrDGVhLIAJ3e6M-_1DGH7pkjjOrOb6EFDINCqxTMwiHjMit4G5Atvv5K-OysCwvjPjB_x8_IVfBuss3h5Ojh-Qax5aLtq5tm2w255_9IwiEGvs4Whgl7y_bqH8BzQcb_Q |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Determining+the+Role+of+Social+Identity+Attributes+to+the+Protection+of+Users%E2%80%99+Privacy+in+Social+Media&rft.jtitle=Future+internet&rft.au=Katerina+Vgena&rft.au=Angeliki+Kitsiou&rft.au=Christos+Kalloniatis&rft.au=Stefanos+Gritzalis&rft.date=2022-09-01&rft.pub=MDPI+AG&rft.eissn=1999-5903&rft.volume=14&rft.issue=9&rft.spage=249&rft_id=info:doi/10.3390%2Ffi14090249&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_1c21b9203156460f865291415a45b42c |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1999-5903&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1999-5903&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1999-5903&client=summon |