The study examines the interplay between privacy concerns, privacy management, self-disclosure, reliability, and the importance of addressing privacy in online social networks, using Facebook as a case study. We provide a detailed structural equation model (SEM) to assess the direct and indirect impacts of privacy-related factors on user behavior. A survey of 500 active Facebook users was conducted online, and the resulting dataset was purified to exclude missing values and issues with insufficient variable loading. The assessment models were assessed for reliability by AVE (average variance extracted), CR (composite reliability), and Cronbach's alpha, while the structural analysis was scrutinized for multicollinearity and outliers. The results demonstrate that data risk substantially influences reliability in self-disclosure, privacy, and Facebook. Reliability significantly influences privacy concerns, self-disclosure, and privacy management on Facebook.
Keywords
Privacy Issues, Privacy Control, Self-Disclosure, Reliability, Confidentiality, Structural Equation Modeling, Online Social Networks, Facebook, User Behavior.
V. Chergarova and L. Wang, “Falsifying Personal Data To Address Online Privacy Issues,” Issues in Information Systems, Jan. 2019, doi: 10.48009/2_iis_2019_183-194.
D. V. Filho and D. R. J. O’Neale, “The role of bipartite structure in R&D collaboration networks,” Journal of Complex Networks, vol. 8, no. 4, Apr. 2020, doi: 10.1093/comnet/cnaa016.
T. Pan et al., “Threat from Being Social: Vulnerability analysis of social Network coupled Smart Grid,” IEEE Access, vol. 5, pp. 16774–16783, Jan. 2017, doi: 10.1109/access.2017.2738565.
C.-H. Chang and M. Potkonjak, Secure system design and trustable computing. 2015. doi: 10.1007/978-3-319-14971-4.
M. Fire, R. Goldschmidt, and Y. Elovici, “Online social networks: Threats and solutions,” IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 2019–2036, Jan. 2014, doi: 10.1109/comst.2014.2321628.
C. Liang and F. R. Yu, “Wireless Network Virtualization: A survey, some research issues and challenges,” IEEE Communications Surveys & Tutorials, vol. 17, no. 1, pp. 358–380, Aug. 2014, doi: 10.1109/comst.2014.2352118.
T. Buchanan and V. Benson, “Spreading disinformation on Facebook: Do trust in message source, risk propensity, or personality affect the organic reach of ‘Fake news’?,” Social Media + Society, vol. 5, no. 4, Oct. 2019, doi: 10.1177/2056305119888654.
K. Finska, A. Hakkala, and A.-M. Majanoja, “Security and privacy enhancing framework for Social Media Influencers and Content Creators,” CompSysTech ’24: Proceedings of the International Conference on Computer Systems and Technologies 2024, pp. 37–42, Jun. 2024, doi: 10.1145/3674912.3674942.
Ho, A. Maiga, and E. Aimeur, “Privacy protection issues in social networking sites,” 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp. 271–278, Jan. 2009, doi: 10.1109/aiccsa.2009.5069336.
L. Young and A. Quan-Haase, “Privacy protection strategies on Facebook,” Information Communication & Society, vol. 16, no. 4, pp. 479–500, Apr. 2013, doi: 10.1080/1369118x.2013.777757.
Fitzgerald, K.-J. Stol, R. O’Sullivan, and D. O’Brien, “Scaling agile methods to regulated environments: An industry case study,” 2013 35th International Conference on Software Engineering (ICSE), pp. 863–872, May 2013, doi: 10.1109/icse.2013.6606635.
Bayaga and M. Kyobe, “PLS-SEM technique and phases of analysis – implications for information systems’ exploratory design researchers,” 2021 Conference on Information Communications Technology and Society (ICTAS), pp. 46–51, Mar. 2021, doi: 10.1109/ictas50802.2021.9395029.
M. J. Culnan and R. J. Bies, “Consumer Privacy: Balancing economic and justice considerations,” Journal of Social Issues, vol. 59, no. 2, pp. 323–342, Apr. 2003, doi: 10.1111/1540-4560.00067.
M. A. Baker and K. Kim, “Other customer service failures: emotions, impacts, and attributions,” Journal of Hospitality & Tourism Research, vol. 42, no. 7, pp. 1067–1085, Oct. 2016, doi: 10.1177/1096348016671394.
K. Lai and S. B. Green, “The Problem with Having Two Watches: Assessment of Fit When RMSEA and CFI Disagree,” Multivariate Behavioral Research, vol. 51, no. 2–3, pp. 220–239, Mar. 2016, doi: 10.1080/00273171.2015.1134306.
G. Wang, H. Chen, and H. Atabakhsh, “Criminal Identity deception and deception detection in law enforcement,” Group Decision and Negotiation, vol. 13, no. 2, pp. 111–127, Mar. 2004, doi: 10.1023/b:grup.0000021838.66662.0c.
F. Lai, D. Li, and C.-T. Hsieh, “Fighting identity theft: The coping perspective,” Decision Support Systems, vol. 52, no. 2, pp. 353–363, Sep. 2011, doi: 10.1016/j.dss.2011.09.002.
T. Herath, R. Chen, J. Wang, K. Banjara, J. Wilbur, and H. R. Rao, “Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service,” Information Systems Journal, vol. 24, no. 1, pp. 61–84, Jul. 2012, doi: 10.1111/j.1365-2575.2012.00420.x.
F. Xu, K. Michael, and X. Chen, “Factors affecting privacy disclosure on social network sites: an integrated model,” Electronic Commerce Research, vol. 13, no. 2, pp. 151–168, Mar. 2013, doi: 10.1007/s10660-013-9111-6.
W. J. Bingley, K. H. Greenaway, and S. A. Haslam, “A Social-Identity Theory of Information-Access Regulation (SITIAR): Understanding the psychology of sharing and withholding,” Perspectives on Psychological Science, vol. 17, no. 3, pp. 827–840, Oct. 2021, doi: 10.1177/1745691621997144.
CRediT Author Statement
The author reviewed the results and approved the final version of the manuscript.
Acknowledgements
The authors would like to thank to the reviewers for nice comments on the manuscript.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics Declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of Data and Materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author Information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding Author
Sungsoo Song
Wonkwang Health Science College, Iksan-si, Jeonbuk State, South Korea.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit: https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this Article
Sungsoo Song, “A Structural Equation Modeling Approach to Understanding Privacy Concerns Reliability and Self Disclosure on Facebook”, Elaris Computing Nexus, pp. 032-040, 06 May 2025, doi: 10.XXXXX/ECN/2025005.