Understanding the disclosure of personal data online
Information and Computer Security
ISSN: 2056-4961
Article publication date: 21 May 2021
Issue publication date: 17 August 2021
Abstract
Purpose
Social media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information.
Design/methodology/approach
Fourteen university students participated in a mixed-methods experiment, where responses to Likert-type scale items were combined with responses to interview questions to provide insight into the cost–benefit analysis users conduct when disclosing information online.
Findings
Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by fear of missing out (FOMO) further allows users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure.
Originality/value
This study provides insight into privacy and information disclosure on social media in South Africa. To the knowledge of the researchers, this is the first study to include a combination of the theory of planned behaviour and the privacy calculus model, together with the antecedent factors of personal valuation of information, trust in the social media provider, FOMO.
Keywords
Acknowledgements
This work is based on research supported in part by the National Research Foundation of South Africa.
Citation
Parker, H.J. and Flowerday, S. (2021), "Understanding the disclosure of personal data online", Information and Computer Security, Vol. 29 No. 3, pp. 413-434. https://doi.org/10.1108/ICS-10-2020-0168
Publisher
:Emerald Publishing Limited
Copyright © 2021, Emerald Publishing Limited